Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Performance Impact of Address Relation Caching., and . LCR, page 213-226. Springer, (1995)Protecting Privacy in Key-Value Search Systems., , and . ACSAC, page 493-504. IEEE Computer Society, (2006)Design Tradeoffs in Applying Content Addressable Storage to Enterprise-scale Systems Based on Virtual Machines., , , , , , and . USENIX ATC, General Track, page 71-84. USENIX, (2006)Language and Run-Time Support for Network Parallel Computing., , , , and . LCPC, volume 1033 of Lecture Notes in Computer Science, page 534-550. Springer, (1995)Do&Merge: Integrating Parallel Loops and Reductions., , , , and . LCPC, volume 768 of Lecture Notes in Computer Science, page 169-183. Springer, (1993)Counting network flows in real time., and . GLOBECOM, page 3888-3893. IEEE, (2003)Realistic CPU Workloads through Host Load Trace Playback., and . LCR, volume 1915 of Lecture Notes in Computer Science, page 246-259. Springer, (2000)Nifty assignments., , , , , , , , and . SIGCSE, page 475-476. ACM, (2012)Optimizing Symbolic Model Checking for Constraint-Rich Models., , , and . CAV, volume 1633 of Lecture Notes in Computer Science, page 328-340. Springer, (1999)Communication and memory requirements as the basis for mapping task and data parallel programs., , , , and . SC, page 330-339. IEEE Computer Society, (1994)