Author of the publication

Cross-layer coordination in the I/O software stack of extreme-scale systems.

, , , , and . Concurr. Comput. Pract. Exp., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion., and . IEEE Access, (2018)Modeling residual-geometric flow sampling., , and . INFOCOM, page 1808-1816. IEEE, (2011)On sample-path staleness in lazy data replication., , and . INFOCOM, page 1104-1112. IEEE, (2015)Cross-layer coordination in the I/O software stack of extreme-scale systems., , , , and . Concurr. Comput. Pract. Exp., (2018)A Novel Noise-Aware Deep Learning Model for Underwater Acoustic Denoising., , , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network., , , , and . IEEE Trans. Knowl. Data Eng., 34 (2): 708-722 (2022)Top-k Dominating Queries on Skyline Groups., , , and . IEEE Trans. Knowl. Data Eng., 32 (7): 1431-1444 (2020)The design of a context-aware service system in intelligent transportation system., , and . Int. J. Distributed Sens. Networks, (2017)An energy-efficient load balance strategy based on virtual machine consolidation in cloud environment., , , , , and . Future Gener. Comput. Syst., (2023)A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)