Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Task Force on Network Storage Architecture: Management of future storage.. HICSS (1), page 724. IEEE Computer Society, (1997)Evaluating job packing in warehouse-scale computing., , and . CLUSTER, page 48-56. IEEE Computer Society, (2014)Designing for Disasters., , , , and . FAST, page 59-72. USENIX, (2004)Obfuscatory obscanturism: Making workload traces of commercially-sensitive systems safe to release., , and . NOMS, page 1279-1286. IEEE, (2012)DieHard: Reliable Scheduling to Survive Correlated Failures in Cloud Data Centers., , , , , and . CCGrid, page 52-59. IEEE Computer Society, (2016)Better Mousetraps.. ACM SIGOPS European Workshop, page 92-94. ACM, (1994)The TickerTAIP Parallel RAID Architecture., , , and . ACM Trans. Comput. Syst., 12 (3): 236-269 (1994)DataMesh, House-Building, and Distributed Systems Technology.. Operating Systems Review, 27 (2): 104-108 (1993)Specifying Data Availability in Multi-Device File Systems., and . Operating Systems Review, 25 (1): 56-59 (1991)An Implementation of the Hamlyn Sender-Managed Interface Architecture., , , , and . OSDI, page 245-259. ACM, (1996)Operating Systems Review 30, Special Issue, October 1996.