Search for persons
X
?
Proceedings of the 31st Annual ACM Symposium on Applied Computing ,
1
An efficient Hadoop data replication method design for hete..:
, In:
?
Proceedings of the 2015 Conference on research in adaptive and convergent systems ,
2
Analysis of expected processing time for multiple memory ba..:
, In:
?
Proceedings of the 30th Annual ACM Symposium on Applied Computing ,
3
An efficient backup-recovery technique to process large dat..:
, In:
?
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems ,
4
Concurrency control scheme for key-value stores based on In..:
, In:
?
Proceedings of the 29th Annual ACM Symposium on Applied Computing ,
5
Impacts of delayed replication on the key-value store:
, In:
?
Proceedings of the 28th Annual ACM Symposium on Applied Computing ,
6
Enhancing security enforcement on unmodified Android:
, In:
?
Proceedings of the 2013 Research in Adaptive and Convergent Systems ,
7
Enhancing lookup performance of key-value stores using cuck..:
, In:
?
Proceedings of the 2013 Research in Adaptive and Convergent Systems ,
8
A worm-containing strategy using a social network and PageR..:
, In:
?
Proceedings of the 2013 Research in Adaptive and Convergent Systems ,
9
Impact of software watermarking on smart devices:
, In:
?
Proceedings of the 2012 ACM Research in Applied Computation Symposium ,
10
A DCH starvation DoS attack in UMTS:
, In:
?
Proceedings of the 27th Annual ACM Symposium on Applied Computing ,
11
A fast mount mechanism for YAFFS2:
, In:
?
Proceedings of the 27th Annual ACM Symposium on Applied Computing ,
12
AAGC : an efficient associativity-aware garbage collecti..:
, In:
?
Proceedings of the 2012 ACM Research in Applied Computation Symposium ,
13
A robust steganography-based software watermarking:
, In:
?
Proceedings of the 2011 ACM Symposium on Research in Applied Computation ,
14
An internet protocol stack for high-speed transmission in a..:
, In:
?
Proceedings of the 2011 ACM Symposium on Research in Applied Computation ,
15