Author of the publication

A Logistic Based Mathematical Model to Optimize Duplicate Elimination Ratio in Content Defined Chunking Based Big Data Storage System.

, , , , , and . Symmetry, 8 (7): 69 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NoT: a high-level no-threading parallel programming method for heterogeneous systems., , , and . J. Supercomput., 75 (7): 3810-3841 (2019)A low-power task scheduling algorithm for heterogeneous cloud computing., , , and . J. Supercomput., 76 (9): 7290-7314 (2020)Fine-grained scheduling in multi-resource clusters., , , and . J. Supercomput., 76 (3): 1931-1958 (2020)SunwayURANS: 3D full-annulus URANS simulations of transonic axial compressors on Sunway TaihuLight., , , , , and . J. Supercomput., 78 (17): 19167-19187 (2022)IncPregel: an incremental graph parallel computation model., , , and . Frontiers Comput. Sci., 12 (6): 1076-1089 (2018)Packet-Level FEC Research over Wireless Networks., , and . Int. J. Distributed Sens. Networks, 5 (1): 100 (2009)Research on Algorithms to Capture Drivers' Write Operations., , , , , and . Comput. J., 58 (11): 3035-3056 (2015)Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description., , , , , and . Comput. J., 66 (6): 1400-1418 (June 2023)Small files storing and computing optimization in Hadoop parallel rendering., , , , and . ICNC, page 1269-1274. IEEE, (2015)KVM-based Detection of Rootkit Attacks., , , , , and . INCoS, page 703-708. IEEE Computer Society, (2011)