Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outlier Elimination and Reliability Assessment for Peak and Declining Time Series Datasets., , and . ICDM (Workshops), page 593-600. IEEE, (2023)Computation mapping for multi-level storage cache hierarchies., , , and . HPDC, page 179-190. ACM, (2010)Disk layout optimization for reducing energy consumption., , and . ICS, page 274-283. ACM, (2005)Power-aware code scheduling for clusters of active disks., , and . ISLPED, page 293-298. ACM, (2005)Reducing power through compiler-directed barrier synchronization elimination., and . ISLPED, page 354-357. ACM, (2006)Percolation theory on interdependent networks based on epidemic spreading, , , , and . EPL (Europhysics Letters), 97 (1): 16006+ (Jan 1, 2012)Towards Improving Rate-Distortion Performance of Transform-Based Lossy Compression for HPC Datasets., , , and . HPEC, page 1-7. IEEE, (2019)Cascaded Dimension Reduction for Effective Anomaly Detection., , , and . IEEE BigData, page 4480-4490. IEEE, (2021)Selective code/data migration for reducing communication energy in embedded MpSoC architectures., , , and . ACM Great Lakes Symposium on VLSI, page 386-391. ACM, (2006)Securing Disk-Resident Data through Application Level Encryption., , , , and . IEEE Security in Storage Workshop, page 46-57. IEEE Computer Society, (2007)