Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerated chaining: a better way to harness peer power in video-on-demand applications., , and . SAC, page 534-539. ACM, (2011)Reliability challenges for storing exabytes., , and . ICNC, page 907-913. IEEE, (2014)DBaaS-Expert: A Recommender for the Selection of the Right Cloud Database., , , and . ISMIS, volume 8502 of Lecture Notes in Computer Science, page 315-324. Springer, (2014)Simulation Modeling of Weak-Consistency Protocols., and . MASCOTS, page 233-238. The Society for Computer Simulation, (1993)File System Workload Analysis For Large Scientific Computing Applications., , , , , , and . MSST, page 139-152. IEEE, (2004)Disk failure prediction in heterogeneous environments., , , , and . SPECTS, page 1-7. IEEE, (2017)Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments., , , , , and . IEEE Trans. Big Data, 6 (4): 792-803 (2020)Authenticating Network-Attached Storage., , , and . IEEE Micro, 20 (1): 49-57 (2000)A File By Any Other Name: Managing File Names with Metadata., , , , and . SYSTOR, page 3:1-3:11. ACM, (2014)A realistic evaluation of consistency algorithms for replicated files., , and . Annual Simulation Symposium, page 121-130. IEEE Computer Society, (1988)