Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of a hash-compress-encrypt pipeline for storage system applications., , , and . NAS, page 355-356. IEEE Computer Society, (2015)Towards Dynamic Scripted pNFS Layouts., , , , and . SC Companion, page 13-17. IEEE Computer Society, (2012)Non-intrusive virtualization management using libvirt., , , , and . DATE, page 574-579. IEEE, (2010)Cost-Effectiveness of Storage Grids and Storage Clusters., and . PDP, page 517-525. IEEE Computer Society, (2007)Reliable and randomized data distribution strategies for large scale storage systems., , , , , and . HiPC, page 1-10. IEEE Computer Society, (2011)Deduplication Analyses of Multimedia System Images., , , and . HotEdge, USENIX Association, (2018)Migration Techniques in HPC Environments., , , , , , and . Euro-Par Workshops (2), volume 8806 of Lecture Notes in Computer Science, page 486-497. Springer, (2014)Simulation and performance analysis of the ECMWF tape library system., , , , and . SC, page 252-263. IEEE Computer Society, (2016)Granular Security for a Science Gateway in Structural Bioinformatics., , , , , , , , , and 11 other author(s). IWSG-Life, volume 819 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)Pure Functions in C: A Small Keyword for Automatic Parallelization., , , , , and . CLUSTER, page 552-556. IEEE Computer Society, (2017)