Author of the publication

Identification and Authentication in Large-Scale Storage Systems.

, , , , and . NAS, page 421-427. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of Priority-Based ATM Switch Design on System Performance., and . ICCI, page 128-132. IEEE Computer Society, (1993)A User-level Socket Layer over Multiple Physical Network Interfaces., , , and . IASTED PDCS, page 804-810. IASTED/ACTA Press, (2002)Research on the Critical Nodes Compensation Algorithm in Sparse Ad Hoc Wireless Networks., , and . DASC, page 359-363. IEEE Computer Society, (2009)Surveillance Video Processing Using Compressive Sensing, , and . CoRR, (2013)Uncertainty analysis of forest above-ground biomass increments in southern Qilian Mountains., , , , and . IGARSS, page 4430-4433. IEEE, (2016)FARMER: a novel approach to file access correlation mining and evaluation reference model for optimizing peta-scale file system performance., , , , and . HPDC, page 185-196. ACM, (2008)EBDI: an architecture for emotional agents., , and . AAMAS, page 11. IFAAMAS, (2007)A symmetric transformation for 3-body potential molecular dynamics using force-decomposition in a heterogeneous distributed environment., , and . ICS, page 105-115. ACM, (2007)Self-stabilizing Population Protocols., , , and . OPODIS, volume 3974 of Lecture Notes in Computer Science, page 103-117. Springer, (2005)Dynamic Load Balancing for I/O- and Memory-Intensive Workload in clusters Using a Feedback Control Mechanism., , , and . Euro-Par, volume 2790 of Lecture Notes in Computer Science, page 224-229. Springer, (2003)