Author of the publication

Shifted declustering: a placement-ideal layout scheme for multi-way replication storage architecture.

, , and . ICS, page 134-144. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Constructions of Equality Test Scheme Without Random Oracles., , , , , and . IEEE Access, (2023)eRAID: Conserving Energy in Conventional Disk-Based RAID System., , and . IEEE Trans. Computers, 57 (3): 359-374 (2008)Automatic Hair Segmentation in Complex Background., , and . ROBIO, page 2496-2501. IEEE, (2019)A Security Control Model Based on Petri Net for Industrial IoT., , , , , and . ICII, page 156-159. IEEE, (2019)Dynamic Attack and Defense Security Situation Assessment Model for Power Information Physical Fusion System., , , , , and . ICII, page 152-155. IEEE, (2019)PHISS: Progressive and hierarchical image segmentation-sharing scheme., , , , and . Digit. Signal Process., (2022)Shifted declustering: a placement-ideal layout scheme for multi-way replication storage architecture., , and . ICS, page 134-144. ACM, (2008)A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems., , , , and . ICII, page 62-65. IEEE, (2019)A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction., , and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 252-267. Springer, (2006)Exploiting In-Memory and On-Disk Redundancy to Conserve Energy in Storage Systems., , and . IEEE Trans. Computers, 57 (6): 733-747 (2008)