Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A preliminary investigation of worm infections in a bluetooth environment., , , , , , , and . WORM, page 9-16. ACM Press, (2006)Robust Consistency Checking for Modern Filesystems., , , , and . RV, volume 8734 of Lecture Notes in Computer Science, page 85-91. Springer, (2014)Scalable Replay-Based Replication For Fast Databases., , and . Proc. VLDB Endow., 10 (13): 2025-2036 (2017)Using dynamic optimization for control of real rate CPU resource management applications., , , and . CDC, page 6547-6552. IEEE, (2003)Tesseract: distributed, general graph pattern mining on evolving graphs., , , , and . EuroSys, page 458-473. ACM, (2021)Rock you like a hurricane: taming skew in large scale analytics., , , , and . EuroSys, page 20:1-20:15. ACM, (2018)Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters., , , , and . ICAC, page 348-349. IEEE Computer Society, (2005)Opportunistic storage maintenance., , and . SOSP, page 457-473. ACM, (2015)Seamless kernel updates., and . DSN, page 1-12. IEEE Computer Society, (2013)Hailstorm: Disaggregated Compute and Storage for Distributed LSM-based Databases., , and . ASPLOS, page 301-316. ACM, (2020)ASPLOS 2020 was canceled because of COVID-19..