Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving One Billion Key-Value Requests per Second on a Single Server., , , , , , , , , and . IEEE Micro, 36 (3): 94-104 (2016)IdleChat: enabling high bandwidth real-time applications in residential broadband networks., , , , and . Mobile Computing and Communications Review, 15 (3): 10-22 (2011)Don't settle for eventual: scalable causal consistency for wide-area storage with COPS., , , and . SOSP, page 401-416. ACM, (2011)FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs., , and . OSDI, page 185-201. USENIX Association, (2016)Mark-and-sweep: getting the "inside" scoop on neighborhood networks., , , , , and . Internet Measurement Conference, page 99-104. ACM, (2008)SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks., , , and . IEEE Symposium on Security and Privacy, page 3-17. IEEE Computer Society, (2008)Defragmenting DHT-based Distributed File Systems., , , , and . ICDCS, page 14. IEEE Computer Society, (2007)EDF: Ensemble, Distill, and Fuse for Easy Video Labeling., , , and . CoRR, (2018)A Short Primer on Causal Consistency., , , and . ;login:, (2013)Using SFS for a Secure Network File System., , and . ;login:, (2002)