Author of the publication

Group file operations for scalable tools and middleware.

, and . HiPC, page 69-78. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Environment-Sensitive Intrusion Detection., , , , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 185-206. Springer, (2005)Automated Discovery of Mimicry Attacks., , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 41-60. Springer, (2006)Automated tracing and visualization of software security structure and properties., , and . VizSEC, page 9-16. ACM, (2012)Performance Measurement of Dynamically Compiled Java Executions., and . Java Grande, page 42-50. ACM, (1999)Techniques for Debugging Parallel Programs with Flowback Analysis., , and . ACM Trans. Program. Lang. Syst., 13 (4): 491-530 (1991)An empirical study of the robustness of MacOS applications using random testing., , and . Random Testing, page 46-54. ACM, (2006)The effects of metadata corruption on nfs., , , , and . StorageSS, page 37-41. ACM, (2007)An Adaptive Cost System for Parallel Program Instrumentation., and . Euro-Par, Vol. I, volume 1123 of Lecture Notes in Computer Science, page 88-97. Springer, (1996)Shared Memory Performance Profiling., , and . PPoPP, page 240-251. ACM, (1997)On-line automated performance diagnosis on thousands of processes., and . PPoPP, page 69-80. ACM, (2006)