Author of the publication

Power-saving in storage systems for Internet hosting services with data access prediction.

, , and . IGCC, page 1-10. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols., , and . IACR Cryptology ePrint Archive, (2010)Power-Saving in Storage Systems for Cloud Data Sharing Services with Data Access Prediction., , and . IEICE Trans. Inf. Syst., 98-D (10): 1744-1754 (2015)Dynamic grid quorum: a reconfigurable grid quorum and its power optimization algorithm., , , and . Serv. Oriented Comput. Appl., 4 (4): 245-260 (2010)Playstyle Generation for Geister With Genetic Algorithm and Clustering., and . ICAART (3), page 916-922. SCITEPRESS, (2023)C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments., and . SECRYPT, page 819-826. SCITEPRESS, (2021)Towards a guideline for clinical trials in the development of human assistive robots., , , , and . ROBIO, page 751-756. IEEE, (2010)Highly Available Primary-Backup Mechanism for Internet Services with Optimistic Consensus., , and . IC2E, page 410-416. IEEE Computer Society, (2014)CapaCon: access control mechanism for inter-device communications through TCP connections., , , , and . SAC, page 706-712. ACM, (2010)Model Checking of BPMN Models for Reconfigurable Workflows., , , and . CoRR, (2016)Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols., , and . Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, page 33-56. Springer, (2009)