Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Transparent Distributed Runtime for Java., , and . Handbook of Parallel Computing, Chapman and Hall/CRC, (2007)The OSD Security Protocol., , , , and . IEEE Security in Storage Workshop, page 29-39. IEEE Computer Society, (2005)JavaSplit: A Runtime for Execution of Monolithic Java Programs on Heterogeneous Collections of Commodity Workstations., , and . CLUSTER, page 110-117. IEEE Computer Society, (2003)Secure Logical Isolation for Multi-tenancy in cloud storage., , , , , , , and . MSST, page 1-5. IEEE Computer Society, (2013)The need for preservation aware storage: a position paper., , , , , and . Operating Systems Review, 41 (1): 19-23 (2007)A high performance cluster JVM presenting a pure single system image., , , , and . Java Grande, page 168-177. ACM, (2000)DYNAMO - DirectorY, Net Archiver and MOver., , and . GRID, volume 2536 of Lecture Notes in Computer Science, page 256-267. Springer, (2002)Stocator: an object store aware connector for apache spark., , , , , and . SoCC, page 653. ACM, (2017)Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage., , , , , , , and . Workshop on the Theory and Practice of Provenance, USENIX, (2009)Karma: Know-It-All Replacement for a Multilevel Cache., , and . FAST, page 169-184. USENIX, (2007)