From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A File By Any Other Name: Managing File Names with Metadata., , , , и . SYSTOR, стр. 3:1-3:11. ACM, (2014)Authenticating Network-Attached Storage., , , и . IEEE Micro, 20 (1): 49-57 (2000)Reliability challenges for storing exabytes., , и . ICNC, стр. 907-913. IEEE, (2014)DBaaS-Expert: A Recommender for the Selection of the Right Cloud Database., , , и . ISMIS, том 8502 из Lecture Notes in Computer Science, стр. 315-324. Springer, (2014)Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments., , , , , и . IEEE Trans. Big Data, 6 (4): 792-803 (2020)A simulation study of replication control protocols using volatile witnesses., , и . Annual Simulation Symposium, стр. 108-117. IEEE Computer Society, (1992)The Case for Efficient File Access Pattern Modeling., и . Workshop on Hot Topics in Operating Systems, стр. 14-19. IEEE Computer Society, (1999)Self-Adaptive Two-Dimensional RAID Arrays., , и . IPCCC, стр. 246-253. IEEE Computer Society, (2007)Highly reliable two-dimensional RAID arrays for archival storage., , , и . IPCCC, стр. 324-331. IEEE Computer Society, (2012)A Low Bandwidth Broadcasting Protocol for Video on Demand., , и . ICCCN, стр. 690-697. IEEE Computer Society, (1998)