Author of the publication

Exploiting non-volatile RAM to enhance flash file system performance.

, , , and . EMSOFT, page 164-173. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing Journaling Harm on Virtualized I/O Systems., , , , , , , and . SYSTOR, page 15:1-15:6. ACM, (2016)Design and implementation of a uniformity-improving page allocation scheme for flash-based storage systems., , , , and . Des. Autom. Embed. Syst., 13 (1-2): 5-25 (2009)Characterization of Web Reference Behavior Revisited: Evidence for Dichotomized Cache Management., and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 1018-1027. Springer, (2003)µSnap: Embracing Traditional Programming Models for Persistent Memory through OS Support., , , , and . NVMSA, page 1-6. IEEE, (2018)The RPT Parallel Gaussian Elimination Algorithm., , and . ICPP (3), page 73-76. CRC Press, (1992)LRFU: A Spectrum of Policies that Subsumes the Least Recently Used and Least Frequently Used Policies., , , , , , and . IEEE Trans. Computers, 50 (12): 1352-1361 (2001)Introduction to the Special Section on SOSP 2021.. ACM Trans. Storage, 18 (3): 19:1 (2022)On Stacking a Persistent Memory File System on Legacy File Systems., , , , and . FAST, page 281-296. USENIX Association, (2023)A Log-Structured Merge Tree-aware Message Authentication Scheme for Persistent Key-Value Stores., , , , and . FAST, page 363-380. USENIX Association, (2022)Traffic Characterization of the Web Server Attacks of Worm Viruses., , and . International Conference on Computational Science, volume 2658 of Lecture Notes in Computer Science, page 703-712. Springer, (2003)