Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Execution of Multiple Queries on Deep Memory Hierarchy., , and . J. Comput. Sci. Technol., 22 (2): 273-279 (2007)Cross-component energy management: Joint adaptation of processor and memory., , , and . TACO, 4 (3): 14 (2007)Adolescent Mouse Takes on An Active Transcriptomic Expression During Postnatal Cerebral Development., , , , , , , , and . Genomics, Proteomics & Bioinformatics, 12 (3): 111-119 (2014)Rx: Treating bugs as allergies - a safe method to survive software failures., , , and . ACM Trans. Comput. Syst., 25 (3): 7 (2007)CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code., , , and . IEEE Trans. Software Eng., 32 (3): 176-192 (2006)The Multi-Queue Replacement Algorithm for Second Level Buffer Caches., , and . USENIX Annual Technical Conference, General Track, page 91-104. USENIX, (2001)Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management., , , , , and . HPCA, page 118-129. IEEE Computer Society, (2004)Experiences with VI Communication for Database Storage., , , , , and . ISCA, page 257-. IEEE Computer Society, (2002)An Energy-Aware Multi-Hop Tree Scatternet for Bluetooth Networks., and . ICC, page 5564-5569. IEEE, (2007)DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior., , , and . MobiSys, page 221-234. ACM, (2016)