Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Itsy: Stretching the Bounds of Mobile Computing., , , , , , , and . Computer, 34 (4): 28-36 (2001)Introduction to the Special Issue on USENIX FAST 2017., and . ACM Trans. Storage, 13 (3): 18:1 (2017)Guiding Simulations of Multi-Tier Storage Caches Using Knee Detection., , , , , , , , and . MASCOTS, page 1-8. IEEE, (2023)Memory Resource Management in VMware ESX Server.. OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.Miniature Cache Simulations for Modeling and Optimization., , , and . login Usenix Mag., (2018)Cache Modeling and Optimization using Miniature Simulations., , , and . USENIX Annual Technical Conference, page 487-498. USENIX Association, (2017)Sweet Spots and Limits for Virtualization., , , , , and . VEE, page 177. ACM, (2016)Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems., , , , , , , and . ASPLOS, page 2-13. ACM, (2008)PABST: Proportionally Allocated Bandwidth at the Source and Target., , and . HPCA, page 505-516. IEEE Computer Society, (2017)Prototyping a hybrid main memory using a virtual machine monitor., , , , , and . ICCD, page 272-279. IEEE Computer Society, (2008)