Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Reliability of (k, n)-Resilient Distributed Systems.. Symposium on Reliability in Distributed Software and Database Systems, page 119-122. IEEE Computer Society, (1984)BROOM: Buffer Replacement using Online Optimization by Mining., , and . CIKM, page 185-192. ACM, (1998)Buffer Management in Distributed Database Systems: A Data Mining Based Approach., , , and . EDBT, volume 1377 of Lecture Notes in Computer Science, page 246-260. Springer, (1998)Editorial., and . Proc. ACM Meas. Anal. Comput. Syst., 4 (2): 21:1 (2020)Paths to stardom: calibrating the potential of a peer-based data management system., , and . SIGMOD Conference, page 265-278. ACM, (2008)An Approach to Analyzing the Behavior of Some Queueing Networks.. Operations Research, 40 (Supplement-2): S300-S311 (1992)Some Performance Issues for Database Transactions with Firm Deadlines.. RTSS, page 322-331. IEEE Computer Society, (1995)A Performance Comparison of Containers and Virtual Machines in Workload Migration Context., , and . ICDCS Workshops, page 61-66. IEEE Computer Society, (2017)What is a Deadlock?. Decentralized and Distributed Systems, volume A-39 of IFIP Transactions, page 49-60. North-Holland, (1993)A tool framework for tweaking features in synthetic datasets., and . CoRR, (2018)