Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Loosely Coupled TCP Acceleration Architecture., , , , , , and . Hot Interconnects, page 3-8. IEEE Computer Society, (2006)Internet Protocol Small Computer System Interface (iSCSI) Cyclic Redundancy Check (CRC)/Checksum Considerations., , , and . RFC, (September 2002)IsoStack - Highly Efficient Network Processing on Dedicated Cores., , , and . USENIX Annual Technical Conference, USENIX Association, (2010)The OSD Security Protocol., , , , and . IEEE Security in Storage Workshop, page 29-39. IEEE Computer Society, (2005)Parallel File Systems for the IBM SP Computers., , , , , , , , , and 4 other author(s). IBM Systems Journal, 34 (2): 222-248 (1995)Internet Protocol storage area networks., , , , and . IBM Systems Journal, 42 (2): 218-231 (2003)The need for preservation aware storage: a position paper., , , , , and . Operating Systems Review, 41 (1): 19-23 (2007)Design of the iSCSI Protocol., and . IEEE Symposium on Mass Storage Systems, page 116-122. IEEE Computer Society, (2003)Preservation DataStores: Architecture for Preservation Aware Storage., , , , , , and . MSST, page 3-15. IEEE Computer Society, (2007)Block storage listener for detecting file-level intrusions., , , and . MSST, page 1-12. IEEE Computer Society, (2010)