Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tradeoffs in Scalable Data Routing for Deduplication Clusters., , , , , and . FAST, page 15-29. USENIX, (2011)The Gold Mailer., , , , , , , , and . ICDE, page 92-99. IEEE Computer Society, (1993)Protect Us from Ourselves.. IEEE Internet Comput., 13 (1): 4-6 (2009)On the Role of Compression in Distributed Systems.. ACM SIGOPS Oper. Syst. Rev., 27 (2): 88-93 (1993)Beating the I/O Bottleneck: A Case for Log-Structured File Systems., and . ACM SIGOPS Oper. Syst. Rev., 23 (1): 11-28 (1989)Performance of Web Proxy Caching in Heterogeneous Bandwidth Environments, , , , and . Proceedings of the IEEE INFOCOM '99 Conference on Computer Communications, page 107-116. New York, NY, IEEE Computer Society Press, (March 1999)Techniques for efficient fragment detection in web pages., , , and . CIKM, page 516-519. ACM, (2003)Web proxy caching: the devil is in the details., , , , and . SIGMETRICS Perform. Evaluation Rev., 26 (3): 11-15 (1998)A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers., , , , , and . USENIX ATC, General Track, page 229-242. USENIX, (2002)Process Migration in the Sprite Operating System., and . ICDCS, page 18-27. IEEE Computer Society, (1987)