Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Design and Verification of the Rio File Cache., and . IEEE Trans. Computers, 50 (4): 322-337 (2001)Free Transactions With Rio Vista., and . SOSP, page 92-101. ACM, (1997)Operating System Review 31(5).Sound garbage collection for C using pointer provenance., , , and . Proc. ACM Program. Lang., 4 (OOPSLA): 176:1-176:28 (2020)A New Approach to I/O Performance Evaluation - Self-Scaling I/O Benchmarks, Predicted I/O Performance., and . ACM Trans. Comput. Syst., 12 (4): 308-339 (1994)A Low-Cost Audio Computer for Information Dissemination Among Illiterate People Groups., , , , , , , , , and 8 other author(s). IEEE Trans. Circuits Syst. I Regul. Pap., 60-I (8): 2039-2050 (2013)Integrating Reliable Memory in Databases., and . VLDB J., 7 (3): 194-204 (1998)JetStream: Cluster-Scale Parallelization of Information Flow Queries., , , and . OSDI, page 451-466. USENIX Association, (2016)A New Approach to I/O Performance Evaluation - Self-Scaling I/O Benchmarks, Predicted I/O Performance., and . SIGMETRICS, page 1-12. ACM, (1993)Memory persistency., , and . ISCA, page 265-276. IEEE Computer Society, (2014)SubVirt: Implementing malware with virtual machines., , , , , and . S&P, page 314-327. IEEE Computer Society, (2006)