Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Reliability of Regeneration-Based Replica Control Protocols., , and . IEEE Trans. Computers, 38 (12): 1691-1702 (1989)Percival: A searchable secret-split datastore., , , , , and . MSST, page 1-12. IEEE Computer Society, (2015)A Dynamic Disk Spin-Down Technique for Mobile Computing., , and . MobiCom, page 130-142. ACM, (1996)Self-adaptive Disk Arrays., , and . SSS, volume 4280 of Lecture Notes in Computer Science, page 469-483. Springer, (2006)Scalable Session Locking for a Distributed File System., , , and . Clust. Comput., 4 (4): 295-306 (2001)Cooperative mode: Comparative storage metadata verification applied to the Xbox 360., , and . Digit. Investig., 11 (Supplement 2): S46-S56 (2014)Increased Reliability with SSPiRAL Data Layouts., , , and . MASCOTS, page 189-198. IEEE Computer Society, (2008)Management policies for non-volatile write caches., and . IPCCC, page 321-328. IEEE, (1999)Swift: Using Distributed Disk Striping to Provide High I/O Data Rates., and . Computing Systems, 4 (4): 405-436 (1991)Group-Based Management of Distributed File Caches., , and . ICDCS, page 525-534. IEEE Computer Society, (2002)