Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies., and . IEEE Trans. Dependable Secur. Comput., 15 (2): 336-350 (2018)Scheduling in practice., , and . SIGMETRICS Perform. Evaluation Rev., 34 (4): 21-28 (2007)Poster reception - The Computer Failure Data Repository (CFDR): collecting, sharing and analyzing failure data., and . SC, page 154. ACM Press, (2006)Improving the Endurance of Next Generation SSD's using WOM-v Codes., , and . ACM Trans. Storage, 18 (4): 29:1-29:32 (2022)Web servers under overload: How scheduling can help., and . ACM Trans. Internet Techn., 6 (1): 20-52 (2006)Hyrax: Fail-in-Place Server Operation in Cloud Platforms., , , , , , , , , and 6 other author(s). OSDI, page 287-304. USENIX Association, (2023)A large-scale study of failures in high-performance computing systems., and . DSN, page 249-258. IEEE Computer Society, (2006)Improving Preemptive Prioritization via Statistical Characterization of OLTP Locking., , , and . ICDE, page 446-457. IEEE Computer Society, (2005)TBD: Benchmarking and Analyzing Deep Neural Network Training., , , , , , and . CoRR, (2018)Benchmarking and Analyzing Deep Neural Network Training., , , , , , , and . IISWC, page 88-100. IEEE Computer Society, (2018)