Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Softbot Approach to OS Interfaces., , , and . IEEE Software, 12 (4): 42-51 (1995)Latency Analysis of TCP on an ATM Network., , and . USENIX Winter, page 167-179. USENIX Association, (1994)Limits to Low-Latency Communication on High-Speed Networks., and . ACM Trans. Comput. Syst., 11 (2): 179-203 (1993)Block-Level Security for Network-Attached Disks., , , , , , , , and . FAST, USENIX, (2003)Boxwood: Abstractions as the Foundation for Storage Infrastructure., , , , and . OSDI, page 105-120. USENIX Association, (2004)Specifying and Verifying Hardware for Tamper-Resistant Software., , , and . IEEE Symposium on Security and Privacy, page 166-. IEEE Computer Society, (2003)Experience with Parallel Computing on the AN2 Network., , and . IPPS, page 94-103. IEEE Computer Society, (1996)Nectar: Automatic Management of Data and Computation in Datacenters., , , , and . OSDI, page 75-88. USENIX Association, (2010)Senslide: a distributed landslide prediction system., , , , , , and . Operating Systems Review, 41 (2): 75-87 (2007)Shasta: A Low Overhead, Software-Only Approach for Supporting Fine-Grain Shared Memory., , and . ASPLOS, page 174-185. ACM Press, (1996)