Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tradeoffs in Scalable Data Routing for Deduplication Clusters., , , , , and . FAST, page 15-29. USENIX, (2011)Performance of Web Proxy Caching in Heterogeneous Bandwidth Environments, , , , and . Proceedings of the IEEE INFOCOM '99 Conference on Computer Communications, page 107-116. New York, NY, IEEE Computer Society Press, (March 1999)Techniques for efficient fragment detection in web pages., , , and . CIKM, page 516-519. ACM, (2003)Protect Us from Ourselves.. IEEE Internet Comput., 13 (1): 4-6 (2009)On the Role of Compression in Distributed Systems.. ACM SIGOPS Oper. Syst. Rev., 27 (2): 88-93 (1993)Beating the I/O Bottleneck: A Case for Log-Structured File Systems., and . ACM SIGOPS Oper. Syst. Rev., 23 (1): 11-28 (1989)Web proxy caching: the devil is in the details., , , , and . SIGMETRICS Perform. Evaluation Rev., 26 (3): 11-15 (1998)The Gold Mailer., , , , , , , , and . ICDE, page 92-99. IEEE Computer Society, (1993)A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers., , , , , and . USENIX ATC, General Track, page 229-242. USENIX, (2002)Storage Alternatives for Mobile Computers., , , , , and . OSDI, page 25-37. USENIX Association, (1994)