Author of the publication

Universal Execution of Parallel Processes: Penetrating NATs over the Grid.

, , , and . International Conference on Computational Science (2), volume 4488 of Lecture Notes in Computer Science, page 577-584. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Highly Available Packet Buffer Design With Hybrid Nonvolatile Memory., , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (11): 2008-2012 (2021)Biscuit: A Framework for Near-Data Processing of Big Data Workloads., , , , , , , , , and 2 other author(s). ISCA, page 153-165. IEEE Computer Society, (2016)Obfuscated malicious javascript detection using classification techniques, , and . Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, page 47 -54. (October 2009)The solid-state drive technology, today and tomorrow., , and . ICDE, page 1520-1522. IEEE Computer Society, (2015)Deploying Computational Storage for HTAP DBMSs Takes More Than Just Computation Offloading., , , , , , and . Proc. VLDB Endow., 16 (6): 1480-1493 (2023)You're Not Who You Claim to Be: Website Identity Check for Phishing Detection., , and . ICCCN, page 1-6. IEEE, (2010)Universal Execution of Parallel Processes: Penetrating NATs over the Grid., , , and . International Conference on Computational Science (2), volume 4488 of Lecture Notes in Computer Science, page 577-584. Springer, (2007)Enhancing QoS and Energy Efficiency of Realtime Network Application on Smartphone Using Cloud Computing., , , , and . APSCC, page 203-207. IEEE Computer Society, (2011)2B-SSD: The Case for Dual, Byte- and Block-Addressable Solid-State Drives., , , , , , and . ISCA, page 425-438. IEEE Computer Society, (2018)Obfuscated malicious javascript detection using classification techniques., , and . MALWARE, page 47-54. IEEE Computer Society, (2009)