Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provenance for the Cloud., , and . FAST, page 197-210. USENIX, (2010)Provenance as first class cloud data, and . SIGOPS Operating Systems Review, 43 (4): 11--16 (January 2010)Ad-hoc multicast routing on resource-limited sensor nodes., , and . REALMAN@MobiHoc, page 87-94. ACM, (2006)Layering in Provenance Systems., , , , , , , and . USENIX Annual Technical Conference, USENIX Association, (2009)Making a Cloud Provenance-Aware., , and . Workshop on the Theory and Practice of Provenance, USENIX, (2009)Improving Recoverability in Multi-tier Storage Systems., , , , and . DSN, page 677-686. IEEE Computer Society, (2007)A hybrid approach for efficient provenance storage., , , , , , and . CIKM, page 1752-1756. ACM, (2012)Reducing Storage Management Costs via Informed User-Based Policies., , , , , and . MSST, page 193-197. IEEE, (2004)Compressing Provenance Graphs., , , , , and . TaPP, USENIX Association, (2011)Provenance-Aware Storage Systems., , , and . USENIX Annual Technical Conference, General Track, page 43-56. USENIX, (2006)