Author of the publication

Security RBSG: Protecting Phase Change Memory with Security-Level Adjustable Dynamic Mapping.

, , , , , , , and . IPDPS, page 1081-1090. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A posteriori error estimates for mixed finite element approximation of nonlinear quadratic optimal control problems., , and . Optimization Methods and Software, 28 (1): 37-53 (2013)Hyperspectral Image Classification Based on Parameter-Optimized 3D-CNNs Combined with Transfer Learning and Virtual Samples., , , , and . Remote Sensing, 10 (9): 1425 (2018)Dealing with Topological Information within a Fully Convolutional Neural Network., , , , , , , , and . CoRR, (2019)Recovery for Failures in Rolling Upgrade on Clouds., , , and . DSN, page 642-647. IEEE Computer Society, (2014)Crying Wolf and Meaning It: Reducing False Alarms in Monitoring of Sporadic Operations through POD-Monitor., , , , , , , and . COUFLESS@ICSE, page 69-75. IEEE Computer Society, (2015)Security RBSG: Protecting Phase Change Memory with Security-Level Adjustable Dynamic Mapping., , , , , , , and . IPDPS, page 1081-1090. IEEE Computer Society, (2016)A Fast Asymmetric Extremum Content Defined Chunking Algorithm for Data Deduplication in Backup Storage Systems., , , , , , and . IEEE Trans. Computers, 66 (2): 199-211 (2017)DARM: A Deduplication-Aware Redundancy Management Approach for Reliable-Enhanced Storage Systems., , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 445-461. Springer, (2018)General Functional Regenerating Codes with Uncoded Repair for Distributed Storage System., , , and . CCGRID, page 372-381. IEEE Computer Society, (2015)Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information., , , , , , , and . USENIX Annual Technical Conference, page 181-192. USENIX Association, (2014)