Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduler vulnerabilities and coordinated attacks in cloud computing., , , and . Journal of Computer Security, 21 (4): 533-559 (2013)Performance models of flash-based solid-state drives for real workloads., and . MSST, page 1-6. IEEE Computer Society, (2011)Modeling Drive-Managed SMR Performance., , , and . ACM Trans. Storage, 13 (4): 38:1-38:22 (2017)Active Flash: Out-of-core data analytics on flash storage., , , , and . MSST, page 1-12. IEEE Computer Society, (2012)Caching in the Multiverse., , , , , and . HotStorage, USENIX Association, (2019)Capsule: an energy-optimized object storage system for memory-constrained sensor devices., , , and . SenSys, page 195-208. ACM, (2006)Hyperion: High Volume Stream Archival for Retrospective Querying., and . USENIX Annual Technical Conference, page 45-58. USENIX, (2007)Active flash: towards energy-efficient, in-situ data analytics on extreme-scale machines., , , , , , and . FAST, page 119-132. USENIX, (2013)Scheduler Vulnerabilities and Attacks in Cloud Computing, , , and . CoRR, (2011)Modeling SMR Drive Performance., , , and . SIGMETRICS, page 389-390. ACM, (2016)