Author of the publication

Optimizing server placement for parallel I/O in switch-based clusters.

, , , and . J. Parallel Distrib. Comput., 69 (3): 266-281 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rooted Spanning Trees in Tournaments., , , and . Graphs and Combinatorics, 16 (4): 411-427 (2000)On avoidable and unavoidable claws., , and . Discrete Mathematics, 184 (1-3): 259-265 (1998)An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation., , , , , and . CSE (3), page 182-188. IEEE Computer Society, (2009)Privacy Protection in Social Network Data Disclosure Based on Granular Computing., , and . FUZZ-IEEE, page 997-1003. IEEE, (2006)Towards Efficient Privacy-preserving Collaborative Recommender Systems., , , , , and . GrC, page 778-783. IEEE, (2008)Logic, Probability, and Privacy: A Framework for Specifying Privacy Requirements., , and . Turing-100, volume 10 of EPiC Series in Computing, page 157-167. EasyChair, (2012)Preserving confidentiality when sharing medical database with the Cellsecu system., , , , and . I. J. Medical Informatics, 71 (1): 17-23 (2003)Aspect-oriented design and implementation of adaptable access control for Electronic Medical Records., , and . I. J. Medical Informatics, 79 (3): 181-203 (2010)Secrecy of Two-Party Secure Computation., , , and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 114-123. Springer, (2005)An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Clusters., , and . RTCSA, volume 2968 of Lecture Notes in Computer Science, page 38-52. Springer, (2003)