Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling MapReduce Vertically and Horizontally., , and . SC, page 525-535. IEEE Computer Society, (2014)Sensitivity of Parallel Applications to Large Differences in Bandwidth and Latency in Two-Layer Interconnects., , and . HPCA, page 244-253. IEEE Computer Society, (1999)Runtime optimizations for a Java DSM implementation., , , and . Java Grande, page 153-162. ACM, (2001)Object combining: A new aggressive optimization for object intensive programs., , , and . Java Grande, page 165-174. ACM, (2002)A Secure Jailing System for Confining Untrusted Applications., , , , and . SECRYPT, page 414-423. INSTICC Press, (2007)Evaluating Design Alternatives for Reliable Communication on High-Speed Networks., , , , and . ASPLOS, page 71-81. ACM Press, (2000)Run-time optimizations for a Java DSM implementation., , , and . Concurr. Comput. Pract. Exp., 15 (3-5): 299-316 (2003)Scalable Overlapping Community Detection., , , , , and . IPDPS Workshops, page 1463-1472. IEEE Computer Society, (2016)A Platform for RFID Security and Privacy Administration (Awarded Best Paper!)., , , , and . LISA, page 89-102. USENIX, (2006)Glasswing: accelerating mapreduce on multi-core and many-core clusters., , and . HPDC, page 295-298. ACM, (2014)