Author of the publication

The Network RamDisk: Using remote memory on heterogeneous NOWs.

, and . Clust. Comput., 2 (4): 281-293 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topic 3: Scheduling and Load Balancing., , , and . Euro-Par, volume 3149 of Lecture Notes in Computer Science, page 220-221. Springer, (2004)Compromising Anonymity Using Packet Spinning., , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 161-174. Springer, (2008)Provable Network Activity for Protecting Users Against False Accusation., , , , , and . WISTP, volume 9895 of Lecture Notes in Computer Science, page 254-261. Springer, (2016)Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes., , and . ICETE (2), page 192-200. ScitePress, (2020)First-Class User-Level Theads., , , and . SOSP, page 110-121. ACM, (1991)Operating System Review 25(5).No Sugar but All the Taste! Memory Encryption Without Architectural Support., , , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 362-380. Springer, (2017)Issues in Reliable Network Memory Paging.. MASCOTS, page 207-211. IEEE Computer Society, (1996)Web-conscious storage management for web proxies., , , and . IEEE/ACM Trans. Netw., 10 (6): 735-748 (2002)Improving the performance of passive network monitoring applications with memory locality enhancements., , , , and . Comput. Commun., 35 (1): 129-140 (2012)I just wanted to track my steps! Blocking unwanted traffic of Fitbit devices., , and . IOT, page 96-103. ACM, (2022)