Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Double Regenerating Codes for hierarchical data centers., , and . ISIT, page 245-249. IEEE, (2016)Balancing Repair Bandwidth and Sub-Packetization in Erasure-Coded Storage via Elastic Transformation., , , , , , , and . INFOCOM, page 1-10. IEEE, (2023)ParaRC: Embracing Sub-Packetization for Repair Parallelization in MSR-Coded Storage., , , , , , , and . FAST, page 17-32. USENIX Association, (2023)Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems., , and . DSN, page 148-159. IEEE Computer Society, (2015)FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication., , , , , , , and . USENIX ATC, page 101-114. USENIX Association, (2016)ELECT: Enabling Erasure Coding Tiering for LSM-tree-based Storage., , , , , and . FAST, page 293-310. USENIX Association, (2024)ADTopk: All-Dimension Top-k Compression for High-Performance Data-Parallel DNN Training., , , , , and . HPDC, page 135-147. ACM, (2024)SPOPB: Reducing solid state drive write traffic for flash-based key-value caching., , , and . Softw. Pract. Exp., 52 (2): 353-373 (2022)Hybrid Codes: Flexible Erasure Codes with Optimized Recovery Performance., , , and . ACM Trans. Storage, 16 (4): 26:1-26:26 (2020)STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography., , , , and . Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 208-220. Springer, (2010)