Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Management policies for non-volatile write caches., and . IPCCC, page 321-328. IEEE, (1999)Increased Reliability with SSPiRAL Data Layouts., , , and . MASCOTS, page 189-198. IEEE Computer Society, (2008)Swift: Using Distributed Disk Striping to Provide High I/O Data Rates., and . Computing Systems, 4 (4): 405-436 (1991)Percival: A searchable secret-split datastore., , , , , and . MSST, page 1-12. IEEE Computer Society, (2015)A Dynamic Disk Spin-Down Technique for Mobile Computing., , and . MobiCom, page 130-142. ACM, (1996)Self-adaptive Disk Arrays., , and . SSS, volume 4280 of Lecture Notes in Computer Science, page 469-483. Springer, (2006)Cooperative mode: Comparative storage metadata verification applied to the Xbox 360., , and . Digit. Investig., 11 (Supplement 2): S46-S56 (2014)Estimating the Reliability of Regeneration-Based Replica Control Protocols., , and . IEEE Trans. Computers, 38 (12): 1691-1702 (1989)Scalable Session Locking for a Distributed File System., , , and . Clust. Comput., 4 (4): 295-306 (2001)An Analytical Study of Opportunistic Lease Renewal., , and . ICDCS, page 146-153. IEEE Computer Society, (2001)