Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance and availability aware regeneration for cloud based multitier applications., , , , and . DSN, page 497-506. IEEE Computer Society, (2010)Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud Infrastructures., , , , and . ICDCS, page 62-73. IEEE Computer Society, (2010)Ostro: Scalable Placement Optimization of Complex Application Topologies in Large-Scale Data Centers., , , , and . ICDCS, page 143-152. IEEE Computer Society, (2015)Authenticated System Calls., , , and . DSN, page 358-367. IEEE Computer Society, (2005)Configurable Communication Protocols for Mobile Computing., and . ISADS, page 220-229. IEEE Computer Society, (1999)An Approach to Constructing Modular Fault-Tolerant Protocols., and . SRDS, page 105-114. IEEE Computer Society, (1993)Software Engineering for Self-Adaptive Systems: A second Research Roadmap., , , , , , , , , and 32 other author(s). Software Engineering for Self-Adaptive Systems, volume 10431 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)Understanding and Using Asynchronous Message Passing (Preliminary Version)., and . PODC, page 141-147. ACM, (1982)Modularity in the design and implementation of Consul., , and . ISADS, page 376-382. IEEE Computer Society, (1993)Feasibility Study of Location-Conscious Multi-Site Erasure-Coded Ceph Storage for Disaster Recovery., , , , and . IC2E, page 204-210. IEEE Computer Society, (2018)