Author of the publication

The dispatch time aligning I/O scheduling for parallel file systems.

, , and . Clust. Comput., 18 (3): 1025-1039 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combinatorics of RNA Structures with Pseudoknots, , and . Bulletin of Mathematical Biology, 70 (1): 45--67 (January 2008)A Semiparametric Approach to the One-Way Layout., , , and . Technometrics, 43 (1): 56-65 (2001)ChIP-Array: combinatory analysis of ChIP-seq/chip and microarray gene expression data to discover direct/indirect targets of a transcription factor., , , , and . Nucleic Acids Res., 39 (Web-Server-Issue): 430-436 (2011)Relationship Between Health Status and Physical Fitness of College Students From South China: An Empirical Study by Data Mining Approach., , , , , , , and . IEEE Access, (2020)L1-2 Regularized Logistic Regression., and . ACSSC, page 779-783. IEEE, (2019)An improved scheme for outsourced computation with attribute-based encryption., , , and . Concurr. Comput. Pract. Exp., (2019)Dual Contrastive Training and Transferability-Aware Adaptation for Multisource Privacy-Preserving Motor Imagery Classification., , , , , and . IEEE Trans. Instrum. Meas., (2024)Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing., , , and . IEEE Trans. Cloud Comput., 10 (3): 2050-2065 (2022)Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT., , , , and . IEEE Trans. Cloud Comput., 9 (3): 1195-1209 (2021)Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises., , and . Comput. Stand. Interfaces, (January 2024)