Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Inevitability of Xen., , , , and . login Usenix Mag., (2005)Brittle systems will break - not bend: can aspect-oriented programming help?, , , , and . ACM SIGOPS European Workshop, page 79-86. ACM, (2002)Approximating Hit Rate Curves using Streaming Algorithms., , , , and . APPROX-RANDOM, volume 40 of LIPIcs, page 225-241. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Characterizing Storage Workloads with Counter Stacks., , , , and . OSDI, page 335-349. USENIX Association, (2014)Beyond Blocks and Files., and . login Usenix Mag., (2010)The main name system: an exercise in centralized computing., , and . Comput. Commun. Rev., 35 (5): 5-14 (2005)Tolerating business failures in hosted applications., , , , , , , , , and 2 other author(s). SoCC, page 22:1-22:16. ACM, (2013)A data synchronization service for ad hoc groups., , , and . WCNC, page 483-488. IEEE, (2004)RemusDB: transparent high availability for database systems., , , , , and . VLDB J., 22 (1): 29-45 (2013)Virtual devices for virtual machines.. University of Cambridge, UK, (2006)British Library, EThOS.