Author of the publication

Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud.

, , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 81-100. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tunable Version Control System for Virtual Machines in an Open-Source Cloud., , and . IEEE Trans. Serv. Comput., 8 (1): 155-168 (2015)CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settings., , and . NOMS, page 188-195. IEEE, (2012)On tracing attackers of distributed denial-of-service attack through distributed approaches.. Chinese University of Hong Kong, Hong Kong, (2007)ndltd.org (oai:cuhk-dr:cuhk_344125).FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities, , and . CoRR, (2012)An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic., , , and . Comput. J., 49 (4): 418-442 (2006)Markov Chain Modelling of the Probabilistic Packet Marking Algorithm., , and . Int. J. Netw. Secur., 5 (1): 32-40 (2007)Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud., , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 81-100. Springer, (2011)Scanning of real-world web applications for parameter tampering vulnerabilities., , , and . AsiaCCS, page 341-352. ACM, (2014)A Precise Termination Condition of the Probabilistic Packet Marking Algorithm., , and . IEEE Trans. Dependable Secur. Comput., 5 (1): 6-21 (2008)Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications., , , and . PDPTA, CSREA Press, (2000)