Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently Retrieving Function Dependencies in the Linux Kernel Using XSB., , and . CoRR, (2013)Sinter: low-bandwidth remote access for the visually-impaired., , and . EuroSys, page 27:1-27:16. ACM, (2016)Stash in a Flash., , , , and . FAST, page 169-188. USENIX Association, (2018)How to Fragment Your File System., , , , , , , , , and 1 other author(s). login Usenix Mag., (2017)Writes Wrought Right, and Other Adventures in File System Optimization., , , , , , , , , and 4 other author(s). ACM Trans. Storage, 13 (1): 3:1-3:26 (2017)External-memory Dictionaries in the Affine and PDAM Models., , , , , , , , , and 3 other author(s). ACM Trans. Parallel Comput., 8 (3): 15:1-15:20 (2021)SteeringWheel: A Locality-Preserving Magnification Interface for Low Vision Web Browsing., , , and . CHI, page 20. ACM, (2018)Mosaic Pages: Big TLB Reach with Small Pages., , , , , , , , , and 6 other author(s). ASPLOS (3), page 433-448. ACM, (2023)Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior., , , , , and . ISSRE, page 388-399. IEEE Computer Society, (2016)The dose makes the poison - Leveraging uncertainty for effective malware detection., , , , , , , and . DSC, page 123-130. IEEE, (2017)