Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Data Sync in a Blink., , and . HotStorage, USENIX Association, (2013)Simba: tunable end-to-end data consistency for mobile apps., , , , , , and . EuroSys, page 7:1-7:16. ACM, (2015)Hierarchical Delay Test Generation., , and . J. Electron. Test., 10 (3): 231-244 (1997)An efficient fusion strategy for multimodal biometric system., , , and . VISAPP (2), page 178-183. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2007)Analyzing the effects of disk-pointer corruption., , , , , and . DSN, page 502-511. IEEE Computer Society, (2008)Building a Delay-Tolerant Cloud for Mobile Data., , , and . MDM (1), page 293-300. IEEE Computer Society, (2013)Low-Latency Analytics on Colossal Data Streams with SummaryStore., and . SOSP, page 647-664. ACM, (2017)A Five-Year Study of File-System Metadata., , , and . FAST, page 31-45. USENIX, (2007)Examining storage performance on mobile devices., , and . MobiHeld@SOSP, page 6:1-6:6. ACM, (2011)QUOTIENT: Two-Party Secure Neural Network Training and Prediction., , , and . CCS, page 1231-1247. ACM, (2019)