Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Voruganti, Kaladhar
add a person with the name Voruganti, Kaladhar
 

Other publications of authors with the same name

Volume.. Encyclopedia of Database Systems, Springer US, (2009)Storage Devices.. Encyclopedia of Database Systems, Springer US, (2009)Storage Access Models.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Responding rapidly to service level violations using virtual appliances., , , , and . ACM SIGOPS Oper. Syst. Rev., 46 (3): 32-40 (2012)POTSHARDS: Secure Long-Term Storage Without Encryption., , , and . USENIX Annual Technical Conference, page 142-156. USENIX, (2007)Fido: Fast Inter-Virtual-Machine Communication for Enterprise Appliances., , , , and . USENIX Annual Technical Conference, USENIX Association, (2009)Policy-Based Validation of SAN Configuration., , , , and . POLICY, page 77-86. IEEE Computer Society, (2004)Cooperative Storage-Level De-duplication for I/O Reduction in Virtualized Data Centers., , , , and . MASCOTS, page 209-218. IEEE Computer Society, (2012)SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism., , , and . FAST, page 297-312. USENIX, (2008)Storage Over IP: When Does Hardware Support Help?, , and . FAST, USENIX, (2003)