Author of the publication

AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication.

, , , , , , and . INFOCOM, page 1337-1345. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A posteriori error estimates for mixed finite element approximation of nonlinear quadratic optimal control problems., , and . Optimization Methods and Software, 28 (1): 37-53 (2013)Recovery for Failures in Rolling Upgrade on Clouds., , , and . DSN, page 642-647. IEEE Computer Society, (2014)Crying Wolf and Meaning It: Reducing False Alarms in Monitoring of Sporadic Operations through POD-Monitor., , , , , , , and . COUFLESS@ICSE, page 69-75. IEEE Computer Society, (2015)Security RBSG: Protecting Phase Change Memory with Security-Level Adjustable Dynamic Mapping., , , , , , , and . IPDPS, page 1081-1090. IEEE Computer Society, (2016)A Fast Asymmetric Extremum Content Defined Chunking Algorithm for Data Deduplication in Backup Storage Systems., , , , , , and . IEEE Trans. Computers, 66 (2): 199-211 (2017)Dealing with Topological Information within a Fully Convolutional Neural Network., , , , , , , , and . CoRR, (2019)Hyperspectral Image Classification Based on Parameter-Optimized 3D-CNNs Combined with Transfer Learning and Virtual Samples., , , , and . Remote Sensing, 10 (9): 1425 (2018)DARM: A Deduplication-Aware Redundancy Management Approach for Reliable-Enhanced Storage Systems., , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 445-461. Springer, (2018)Classification of Hyperspectral Image by CNN Based on Shadow Area Enhancement Through Dynamic Stochastic Resonance., , , and . IEEE Access, (2019)Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information., , , , , , , and . USENIX Annual Technical Conference, page 181-192. USENIX Association, (2014)