Author of the publication

Enabling Efficient Updates in KV Storage via Hashing: Design and Performance Evaluation.

, , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Regenerating Codes over Binary Cyclic Codes., , , and . ISIT, page 216-220. IEEE, (2019)Identity attack and anonymity protection for P2P-VoD systems., , and . IWQoS, page 1-9. IEEE, (2011)VegaNet: a virtualized experimentation platform for production networks with connectivity consistency., , , , and . IEEE Netw., 26 (5): 15-21 (2012)Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service., , , , , and . ACSAC, page 119-128. ACM, (2012)Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud., , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 81-100. Springer, (2011)Single Disk Failure Recovery forX-Code-Based Parallel Storage Systems., , , , , , and . IEEE Trans. Computers, 63 (4): 995-1007 (2014)Dynamic Packet Forwarding Verification in SDN., , , , and . IEEE Trans. Dependable Secur. Comput., 16 (6): 915-929 (2019)Coupling Decentralized Key-Value Stores with Erasure Coding., , and . SoCC, page 377-389. ACM, (2019)Enhancing the trust of internet routing with lightweight route attestation., , , , , and . AsiaCCS, page 92-101. ACM, (2011)OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage Systems., , , and . FAST, page 331-344. USENIX Association, (2019)