Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fidelity-aware replication for mobile devices., , , , and . MobiSys, page 83-94. ACM, (2009)Formal Analysis of a Distributed Algorithm for Tracking Progress., , , and . FMOODS/FORTE, volume 7892 of Lecture Notes in Computer Science, page 5-19. Springer, (2013)Policy-based access control for weakly consistent replication., , and . EuroSys, page 293-306. ACM, (2010)Optimizing for a multiprocessor: Balancing synchronization costs against parallelism in straight-line code., and . Symposium on Programming, volume 137 of Lecture Notes in Computer Science, page 194-211. Springer, (1982)Fidelity-Aware Replication for Mobile Devices., , , , , and . IEEE Trans. Mob. Comput., 9 (12): 1697-1712 (2010)Effective and efficient compromise recovery for weakly consistent replication., , , , , , and . EuroSys, page 131-144. ACM, (2009)Experience with Autonet.. Computer Networks and ISDN Systems, 25 (6): 623-629 (1993)Automatic Reconfiguration in Autonet., and . SOSP, page 183-197. ACM, (1991)Operating System Review 25(5).Transactional Flash., , and . OSDI, page 147-160. USENIX Association, (2008)SmartBridge: A scalable bridge architecture., , and . SIGCOMM, page 205-216. ACM, (2000)