Author of the publication

Lazy repair with temporary redundancy(LRTR): reducing repair network traffic in erasure-coded storage.

, , , , , , and . CF, page 85-93. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , and . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, page 175-178. (April 2009)Parallel program design for JPEG compression encoding., and . FSKD, page 2502-2506. IEEE, (2012)Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem., , and . J. Comput. Sci. Technol., 22 (1): 92-94 (2007)A light weight SLA management infrastructure for cloud computing., , and . CCECE, page 1-4. IEEE, (2013)A Quantitative Approach for Memory Fragmentation in Mobile Systems., , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 339-349. Springer, (2016)New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 253-264. Springer, (2008)P2P traffic identification and optimization using fuzzy c-means clustering., and . FUZZ-IEEE, page 2245-2252. IEEE, (2011)Realistic Task Parallelization of the H.264 Decoding Algorithm for Multiprocessors., , , , , , , , , and . HPCC/CSS/ICESS, page 871-874. IEEE, (2015)TLC-FTL: Workload-Aware Flash Translation Layer for TLC/SLC Dual-Mode Flash Memory in Embedded Systems., , , , and . HPCC/CSS/ICESS, page 831-834. IEEE, (2015)Balloonfish: Utilizing morphable resistive memory in mobile virtualization., , , , , and . ASP-DAC, page 322-327. IEEE, (2015)