Author of the publication

CLOCK-Pro: An Effective Improvement of the CLOCK Replacement.

, , and . USENIX Annual Technical Conference, General Track, page 323-336. USENIX, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Consensus Protocol for Sidechains., , , and . CoRR, (2019)Controller Optimization Approach Using LSTM-Based Identification Model for Pumped-Storage Units., , , , and . IEEE Access, (2019)Ranking inter-relationships between clusters., , and . Int. J. Systems Science, 42 (12): 2071-2083 (2011)Query-Driven Discovery of Anomalous Subgraphs in Attributed Graphs., , , , and . IJCAI, page 3105-3111. ijcai.org, (2017)Method to Evaluate Software Protection Based on Attack Modeling., , , , , and . HPCC/EUC, page 837-844. IEEE, (2013)Integrated dual grating polymer microbeams for bio-chemical sensing in liquid environment., , , , and . NEMS, page 1204-1207. IEEE, (2013)Understanding the Performance Gap Between Pull-Based Mesh Streaming Protocols and Fundamental Limits., , and . INFOCOM, page 891-899. IEEE, (2009)A joint typicality approach to compute-forward., , , and . Allerton, page 1294-1301. IEEE, (2015)Prolonging network lifetime in two-level heterogeneous Wireless Sensor Networks., , , , and . ISCIT, page 871-876. IEEE, (2012)SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption., , , , , and . CoRR, (2017)