Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly localization in large-scale clusters., , and . CLUSTER, page 322-330. IEEE Computer Society, (2007)A practical failure prediction with location and lead time for Blue Gene/P., , , , and . DSN Workshops, page 15-22. IEEE Computer Society, (2010)Practical online failure prediction for Blue Gene/P: Period-based vs event-driven., , , and . DSN Workshops, page 259-264. IEEE Computer Society, (2011)When is multi-version checkpointing needed?, , and . FTXS, page 49-56. ACM, (2013)Dynamic Meta-Learning for Failure Prediction in Large-Scale Systems: A Case Study., , , , , and . ICPP, page 157-164. IEEE Computer Society, (2008)Face Recognition Using Fisher Non-negative Matrix Factorization with Sparseness Constraints., , , , and . ISNN (2), volume 3497 of Lecture Notes in Computer Science, page 112-117. Springer, (2005)Enhancing application robustness through adaptive fault tolerance., , , and . IPDPS, page 1-5. IEEE, (2008)Performance under Failures of DAG-based Parallel Computing., , , , and . CCGRID, page 236-243. IEEE Computer Society, (2009)Fault Tolerance in an Inner-Outer Solver: A GVR-Enabled Case Study., , and . VECPAR, volume 8969 of Lecture Notes in Computer Science, page 124-132. Springer, (2014)Filtering log data: Finding the needles in the Haystack., , , , , and . DSN, page 1-12. IEEE Computer Society, (2012)