Author of the publication

Metadata changes in large file systems: a metadata querying perspective.

, , , and . Comput. Syst. Sci. Eng., (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines., , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 751-758. IEEE, (2018)I2P Anonymous Communication Network Measurement and Analysis., , , , and . SmartCom, volume 11910 of Lecture Notes in Computer Science, page 105-115. Springer, (2019)ZettaDS: A Light-weight Distributed Storage System for Cluster., , , and . ChinaGrid, page 158-164. IEEE Computer Society, (2008)No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS., , , and . GLOBECOM, page 1-6. IEEE, (2019)GenéLive! Generating Rhythm Actions in Love Live!, , , , , , , , and . AAAI, page 5266-5275. AAAI Press, (2023)General Running Service: An Execution Framework for Executing Legacy Program on Grid., , , , and . GCC Workshops, page 522-529. IEEE Computer Society, (2006)A Content-Based Generator Method for Vessel Detection., , , , and . SINC, volume 2057 of Communications in Computer and Information Science, page 9-16. Springer, (2023)ENiD: An Encrypted Web Pages Traffic Identification Based on Web Visiting Behavior., , , , and . ICDM (Workshops), page 593-601. IEEE, (2022)A Transparently-Scalable Metadata Service for the Ursa Minor Storage System., , , , and . USENIX ATC, USENIX Association, (2010)An effective deep learning adversarial defense method based on spatial structural constraints in embedding space., , , , , and . Pattern Recognit. Lett., (2024)