Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transaction Rate Limiters for Peer-to-Peer Systems., , and . Peer-to-Peer Computing, page 3-11. IEEE Computer Society, (2008)Operational Interpretations of an Extension of Fomega with Control Operators., and . J. Funct. Program., 6 (3): 393-417 (1996)Extreme Binning: Scalable, parallel deduplication for chunk-based file backup., , , and . MASCOTS, page 1-9. IEEE Computer Society, (2009)Sparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality., , , , , and . FAST, page 111-123. USENIX, (2009)Block-Level Security for Network-Attached Disks., , , , , , , , and . FAST, USENIX, (2003)A Type-Theoretic Approach to Higher-Order Modules with Sharing., and . POPL, page 123-137. ACM Press, (1994)Memory-Oriented Distributed Computing at Rack Scale., , , , , , , and . SoCC, page 529. ACM, (2018)Reliability analysis of deduplicated and erasure-coded storage., , and . SIGMETRICS Performance Evaluation Review, 38 (3): 4-9 (2010)Reliability Analysis of SSDs Under Power Fault., , , , , and . ACM Trans. Comput. Syst., 34 (4): 10:1-10:28 (2017)Controlled lock violation., , , , and . SIGMOD Conference, page 85-96. ACM, (2013)