Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling the Impact of Disk Scrubbing on Storage System., , , , and . JCP, 5 (11): 1629-1637 (2010)Optimal Clustering Size of Small File Access in Network Attached Storage Device., , , , and . Parallel Processing Letters, 16 (4): 501-512 (2006)Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography., , , and . Comput. J., 55 (6): 702-716 (2012)DBA: A Dynamic Bloom Filter Array for Scalable Membership Representation of Variable Large Data Sets., , , and . MASCOTS, page 466-468. IEEE Computer Society, (2011)Full Integrity and Freshness for Outsourced Storage., , , , , and . CCGRID, page 362-371. IEEE Computer Society, (2015)Self-Similarity in Data Traffic for Object-Based Storage System., , , and . IWNAS, page 23-28. IEEE Computer Society, (2006)Implementing and Evaluating Security Controls for an Object-Based Storage System., , , , , , , and . MSST, page 87-99. IEEE Computer Society, (2007)An Improved Decoding Algorithm for Generalized RDP Codes., , and . IEEE Communications Letters, 20 (4): 632-635 (2016)Totoro: A Scalable and Fault-Tolerant Data Center Network by Using Backup Port., , and . NPC, volume 8147 of Lecture Notes in Computer Science, page 94-105. Springer, (2013)Using Blockchain for Data Auditing in Cloud Storage., , , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 335-345. Springer, (2018)