Author of the publication

Seamless Peripherals Integration for Network Computers based on the Reversed Server Message Block Protocol.

, , , and . ICNS, page 112. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Application of Virtual Machines on System Security., , and . ChinaGrid, page 222-229. IEEE Computer Society, (2009)Granularity analysis for exploiting adaptive parallelism of declarative programs on multiprocessors., , , , and . J. Comput. Sci. Technol., 9 (2): 144-152 (1994)Design and Implementation of an Out-of-Band Virtualization System for Large SANs., , , and . IEEE Trans. Computers, 56 (12): 1654-1665 (2007)Design and Implementation of an SAN System Based on the Fiber Channel Protocol., , and . IEEE Trans. Computers, 54 (4): 439-448 (2005)Taming Hardware Event Samples for Precise and Versatile Feedback Directed Optimizations., , , , , , and . IEEE Trans. Computers, 62 (2): 376-389 (2013)PLC Introduction., and . IPDPS Workshops, page 1136-1137. IEEE, (2013)CaCo: An Efficient Cauchy Coding Approach for Cloud Storage Systems., , , , , and . IEEE Trans. Computers, 65 (2): 435-447 (2016)Redistribute Data to Regain Load Balance during RAID-4 Scaling., , , , and . IEEE Trans. Parallel Distrib. Syst., 26 (1): 219-229 (2015)Task optimization based on CPU pipeline technique in a multicore system., , and . Computers & Mathematics with Applications, 63 (2): 536-543 (2012)Automatically constructing trusted cluster computing environment., , , , , , and . The Journal of Supercomputing, 55 (1): 51-68 (2011)