Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage., , , , , , , and . Workshop on the Theory and Practice of Provenance, USENIX, (2009)PANACEA Towards a Self-healing Development Framework., , , , and . Integrated Network Management, page 169-178. IEEE, (2007)ADSC: Application-Driven Storage Control for Energy Efficiency., , , , , , , and . ICT-GLOW, volume 6868 of Lecture Notes in Computer Science, page 165-179. Springer, (2011)Root-cause analysis of SAN performance problems: an I/O path affine search approach., , , , and . Integrated Network Management, page 251-264. IEEE, (2005)Towards an Object Stor., , , , , , , , , and . IEEE Symposium on Mass Storage Systems, page 165-. IEEE Computer Society, (2003)A Dynamic Power Management Controller for Optimizing Servers' Energy Consumption in Service Centers., , , , , , and . ICSOC Workshops, volume 6568 of Lecture Notes in Computer Science, page 158-168. (2010)Two-arm manipulation: what can we learn by studying humans?, , , and . IROS (1), page 70-75. IEEE Computer Society, (1995)Performance management via adaptive thresholds with separate control of false positive and false negative errors., , , and . Integrated Network Management, page 195-202. IEEE, (2009)Mechanisms underlying the generation of averaged modified trajectories., and . Biol. Cybern., 72 (5): 407-419 (1995)Using XFDU for CASPAR information packaging., , , , , , and . OCLC Syst. Serv., 26 (2): 80-93 (2010)