Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection., , , and . INFOCOM, IEEE, (2006)Proactive Memory Scaling of Virtualized Applications., , , , , , and . CLOUD, page 277-284. IEEE, (2015)Altering document term vectors for classification: ontologies as expectations of co-occurrence., , , , , and . WWW, page 1225-1226. ACM, (2007)Evaluation of Active Disks for Decision Support Databases., , and . HPCA, page 337-348. IEEE Computer Society, (2000)Automated control of multiple virtualized resources., , , , , , , and . EuroSys, page 13-26. ACM, (2009)Index translation schemes for adaptive computations on distributed memory multicomputers., , and . IPPS, page 812-819. IEEE Computer Society, (1995)Workload dependent IO scheduling for fairness and efficiency in shared storage systems., , , , and . HiPC, page 1-10. IEEE Computer Society, (2012)Efficient and adaptive proportional share I/O scheduling., , , , and . SIGMETRICS Performance Evaluation Review, 37 (2): 79-80 (2009)What does control theory bring to systems research?, , , , , , and . Operating Systems Review, 43 (1): 62-69 (2009)Buttress: A Toolkit for Flexible and High Fidelity I/O Benchmarking., , , and . FAST, page 45-58. USENIX, (2004)