Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid local and distributed sketching design for accurate and scalable heavy key detection in network data streams., and . Computer Networks, (2015)Enabling Concurrent Failure Recovery for Regenerating-Coding-Based Storage Systems: From Theory to Practice., , and . IEEE Trans. Computers, 64 (7): 1898-1911 (2015)Opportunistic use of client repeaters to improve performance of WLANs., , , , , , and . IEEE/ACM Trans. Netw., 17 (4): 1160-1171 (2009)Distributed algorithms for secure multipath routing in attack-resistant networks., , and . IEEE/ACM Trans. Netw., 15 (6): 1490-1501 (2007)Toward Optimal Network Fault Correction in Externally Managed Overlay Networks., , and . IEEE Trans. Parallel Distrib. Syst., 21 (3): 354-366 (2010)A Hybrid Cloud Approach for Secure Authorized Deduplication., , , , and . IEEE Trans. Parallel Distrib. Syst., 26 (5): 1206-1216 (2015)Stochastic modeling and optimization of garbage collection algorithms in solid-state drive systems., , and . Queueing Syst., 77 (2): 115-148 (2014)ProWord: An unsupervised approach to protocol feature word extraction., , , , and . INFOCOM, page 1393-1401. IEEE, (2014)Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems., , and . INFOCOM, page 2355-2363. IEEE, (2013)NCCloud: applying network coding for the storage repair in a cloud-of-clouds., , , and . FAST, page 21. USENIX Association, (2012)