Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes., , , , , and . Parallel Process. Lett., 11 (2/3): 267-280 (2001)URegM: a unified prediction model of resource consumption for refactoring software smells in open source cloud., and . CoRR, (2023)A new paradigm: Data-aware scheduling in grid computing., and . Future Gener. Comput. Syst., 25 (4): 406-413 (2009)Software Sustainability: A Systematic Literature Review and Comprehensive Analysis., and . CoRR, (2019)PetaShare: A reliable, efficient and transparent distributed storage management system., , , and . Sci. Program., 19 (1): 27-43 (2011)Distributed data management with PetaShare., , and . Mardi Gras Conference, volume xxx of ACM International Conference Proceeding Series, page 19. ACM, (2008)Learning to Maximize Network Bandwidth Utilization with Deep Reinforcement Learning., , , and . GLOBECOM, page 3711-3716. IEEE, (2023)Qualitative analysis of the relationship between design smells and software engineering challenges., and . ESSE, page 48-55. ACM, (2022)Hysteresis-based optimization of data transfer throughput., , and . NDM@SC, page 5:1-5:9. ACM, (2015)Network-aware data caching and prefetching for cloud-hosted metadata retrieval., , , , and . NDM@SC, page 4:1-4:10. ACM, (2013)