Author of the publication

NV-Dedup: High-Performance Inline Deduplication for Non-Volatile Memory.

, , , , , and . IEEE Trans. Computers, 67 (5): 658-671 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved kNN text classification method., , and . Int. J. Comput. Sci. Eng., 20 (3): 397-403 (2019)A Rule-Based Ontology for Context-Aware Computing., , , and . BMEI, page 1-4. IEEE, (2009)Situation evaluate on hierarchical network security based on D-S evidence theory., and . Int. J. Commun. Networks Distributed Syst., 13 (3/4): 245-256 (2014)Situation prediction of large-scale Internet of Things network security., , , and . EURASIP J. Information Security, (2019)LAWN: boosting the performance of NVMM file system through reducing write amplification., and . DAC, page 6:1-6:6. ACM, (2018)AisLSM: Revolutionizing the Compaction with Asynchronous I/Os for LSM-tree., , , and . CoRR, (2023)Persisting RB-Tree into NVM in a Consistency Perspective., , , , , , , , and . ACM Trans. Storage, 14 (1): 6:1-6:27 (2018)STITCHER: Correlating Digital Forensic Evidence on Internet-of-Things Devices., , and . CoRR, (2020)A novel personality detection method based on high-dimensional psycholinguistic features and improved distributed Gray Wolf Optimizer for feature selection., , and . Inf. Process. Manag., 60 (2): 103217 (2023)How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation., , , , and . J. Syst. Archit., (2021)