Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection., , , and . INFOCOM, IEEE, (2006)CacheSack: Theory and Experience of Google's Admission Optimization for Datacenter Flash Caches., , , , , and . ACM Trans. Storage, 19 (2): 13:1-13:24 (May 2023)Automated control of multiple virtualized resources., , , , , , , and . EuroSys, page 13-26. ACM, (2009)Altering document term vectors for classification: ontologies as expectations of co-occurrence., , , , , and . WWW, page 1225-1226. ACM, (2007)Evaluation of Active Disks for Decision Support Databases., , and . HPCA, page 337-348. IEEE Computer Society, (2000)Communication Optimizations for Irregular Scientific Computations on Distributed Memory Architectures., , , and . J. Parallel Distributed Comput., 22 (3): 462-478 (1994)Efficient Performance Prediction for Large-Scale, Data-Intensive Applications., , , , , and . Int. J. High Perform. Comput. Appl., 14 (3): 216-227 (2000)A Modular, Analytical Throughput Model for Modern Disk Arrays., , and . MASCOTS, page 183-192. IEEE Computer Society, (2001)Active Disks: Programming Model, Algorithms and Evaluation., , and . ASPLOS, page 81-91. ACM Press, (1998)A Performance Prediction Framework for Data Intensive Applications on Large Scale Parallel Machines., , , and . LCR, volume 1511 of Lecture Notes in Computer Science, page 243-258. Springer, (1998)