Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Configurable security for scavenged storage systems., , and . StorageSS, page 55-62. ACM, (2008)VMFlock: virtual machine co-migration for the cloud., , , and . HPDC, page 159-170. ACM, (2011)Cost exploration of data sharings in the cloud., , , and . EDBT, page 601-612. ACM, (2013)Beyond Music Sharing: An Evaluation of Peer-to-Peer Data Dissemination Techniques in Large Scientific Collaborations., , , and . J. Grid Comput., 7 (1): 91-114 (2009)enabling cross-layer optimizations in storage systems with custom metadata., , , , and . HPDC, page 213-216. ACM, (2008)A Workflow-Aware Storage System: An Opportunity Study., , , , , , and . CCGRID, page 326-334. IEEE Computer Society, (2012)Interacting with Large Distributed Datasets Using Sketch., , , , , , , , and . EGPGV, page 31-43. Eurographics Association, (2016)GPUs as Storage System Accelerators., , and . IEEE Trans. Parallel Distrib. Syst., 24 (8): 1556-1566 (2013)Physical Disentanglement in a Container-Based File System., , , , , and . OSDI, page 81-96. USENIX Association, (2014)Support for Provisioning and Configuration Decisions for Data Intensive Workflows., , , and . IEEE Trans. Parallel Distrib. Syst., 27 (9): 2725-2739 (2016)