Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms and data structures for compressed-memory machines., , , and . IBM J. Res. Dev., 45 (2): 245-258 (2001)Program behavior characterization in large memory systems., , , , and . ISPASS, page 113-114. IEEE Computer Society, (2010)Memory Expansion Technology (MXT): Competitive impact., , , and . IBM J. Res. Dev., 45 (2): 303-310 (2001)Flipstone: managing storage with fail-in-place and deferred maintenance service models., , , , , and . ACM SIGOPS Oper. Syst. Rev., 42 (1): 54-62 (2008)PAM: a novel performance/power aware meta-scheduler for multi-core systems., , and . SC, page 39. IEEE/ACM, (2008)Storage-based file system integrity checker., , and . StorageSS, page 57-63. ACM, (2005)Evaluating high performance communication: a power perspective., , and . ICS, page 326-337. ACM, (2009)A Hybrid Approach for Large Cache Performance Studies., , , , and . QEST, page 47-56. IEEE Computer Society, (2011)Memory Expansion Technology (MXT): Software support and performance., , , , , , and . IBM J. Res. Dev., 45 (2): 287-302 (2001)Storage-Based Intrusion Detection for Storage Area Networks (SANs)., , and . MSST, page 118-127. IEEE Computer Society, (2005)