Search the dblp DataBase
E. N. Elnozahy :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
B. Acevedo , L. Bahler , E. N. Elnozahy , V. Ratan , M. E. Segal Highly Available Directory Services in DCE. [Citation Graph (0, 0)][DBLP ] FTCS, 1996, pp:387-391 [Conf ] Lorenzo Alvisi , E. N. Elnozahy , Sriram Rao , Syed Amir Husain , Asanka De Mel An Analysis of Communication Induced Checkpointing. [Citation Graph (0, 0)][DBLP ] FTCS, 1999, pp:242-249 [Conf ] E. N. Elnozahy How Safe is Probabilistic Checkpointing? [Citation Graph (0, 0)][DBLP ] FTCS, 1998, pp:358-363 [Conf ] E. N. Elnozahy , Willy Zwaenepoel Replicated Distributed Process in Manetho. [Citation Graph (0, 0)][DBLP ] FTCS, 1992, pp:18-27 [Conf ] E. N. Elnozahy , Willy Zwaenepoel On the Use and Implementation of Message Logging. [Citation Graph (0, 0)][DBLP ] FTCS, 1994, pp:298-307 [Conf ] J. Hamilton Slye , E. N. Elnozahy Supporting Nondeterministic Execution in Fault-Tolerant Systems. [Citation Graph (0, 0)][DBLP ] FTCS, 1996, pp:250-259 [Conf ] Yi-Min Wang , Pi-Yu Chung , Yennun Huang , E. N. Elnozahy Integrating Checkpointing with Transaction Processing. [Citation Graph (0, 0)][DBLP ] FTCS, 1997, pp:304-308 [Conf ] E. N. Elnozahy Fault Tolerance for Clusters of Workstations. [Citation Graph (0, 0)][DBLP ] Hardware and Software Architectures for Fault Tolerance, 1993, pp:151-158 [Conf ] Mohamed G. Gouda , Chin-Tser Huang , E. N. Elnozahy Key Trees and the Security of Interval Multicast. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:467-468 [Conf ] Chin-Tser Huang , Mohamed G. Gouda , E. N. Elnozahy Convergence of IPsec in Presence of Resets. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:22-27 [Conf ] Mohamed G. Gouda , E. N. Elnozahy , Chin-Tser Huang , Tommy M. McGuire Hop Integrity in Computer Networks. [Citation Graph (0, 0)][DBLP ] ICNP, 2000, pp:3-11 [Conf ] E. N. Elnozahy Four Years with the High Productivity Computing Systems Program - A Perspective. [Citation Graph (0, 0)][DBLP ] ICPP, 2006, pp:- [Conf ] E. N. Elnozahy , Michael Kistler , Ramakrishnan Rajamony Energy-Efficient Server Clusters. [Citation Graph (0, 0)][DBLP ] PACS, 2002, pp:179-196 [Conf ] E. N. Elnozahy On the Relevance of Communication Costs of Rollback-Recovery Protocols. [Citation Graph (0, 0)][DBLP ] PODC, 1995, pp:74-79 [Conf ] E. N. Elnozahy , Rami G. Melhem , Daniel Mossé Energy-Efficient Duplex and TMR Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 2002, pp:256-0 [Conf ] E. N. Elnozahy Address Trace Compression Through Loop Detection and Reduction. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1999, pp:214-215 [Conf ] John K. Bennett , John B. Carter , Alan L. Cox , E. N. Elnozahy , David B. Johnson , Peter J. Keleher , Willy Zwaenepoel Distributed shared memory: experience with Munin. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1992, pp:- [Conf ] E. N. Elnozahy , David B. Johnson , Willy Zwaenepoel The Performance of Consistent Checkpointing. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1992, pp:39-47 [Conf ] Anupam Bhide , E. N. Elnozahy , Stephen P. Morgan A Highly Available Network File Server. [Citation Graph (0, 0)][DBLP ] USENIX Winter, 1991, pp:199-206 [Conf ] E. N. Elnozahy , Michael Kistler , Ramakrishnan Rajamony Energy Conservation Policies for Web Servers. [Citation Graph (0, 0)][DBLP ] USENIX Symposium on Internet Technologies and Systems, 2003, pp:- [Conf ] Anupam Bhide , E. N. Elnozahy , Stephen P. Morgan Implicit Replication in a Network File Server. [Citation Graph (0, 0)][DBLP ] Workshop on the Management of Replicated Data, 1990, pp:85-90 [Conf ] E. N. Elnozahy , Willy Zwaenepoel An Integrated Approach to Fault Tolerance. [Citation Graph (0, 0)][DBLP ] Workshop on the Management of Replicated Data, 1992, pp:82-85 [Conf ] E. N. Elnozahy , Lorenzo Alvisi , Yi-Min Wang , David B. Johnson A survey of rollback-recovery protocols in message-passing systems. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 2002, v:34, n:3, pp:375-408 [Journal ] Bishop Brock , Gary D. Carpenter , Eli Chiprout , Mark E. Dean , Philippe L. De Backer , E. N. Elnozahy , Hubertus Franke , Mark Giampapa , David Glasco , James L. Peterson , Ramakrishnan Rajamony , Rajan Ravindran , Freeman L. Rawson III , Ronald L. Rockhold , Juan Rubio Experience with building a commodity Intel-based ccNUMA system. [Citation Graph (0, 0)][DBLP ] IBM Journal of Research and Development, 2001, v:45, n:2, pp:207-228 [Journal ] E. N. Elnozahy , Rajiv V. Joshi Preface. [Citation Graph (0, 0)][DBLP ] IBM Journal of Research and Development, 2003, v:47, n:5-6, pp:521-524 [Journal ] James L. Peterson , Patrick J. Bohrer , Liqun Chen , E. N. Elnozahy , Ahmed Gheith , Richard H. Jewell , Michael Kistler , T. R. Maeurer , Sean A. Malone , David B. Murrell , Neena Needel , Karthick Rajamani , Mark A. Rinaldi , Richard O. Simpson , Kartik Sudeep , Lixin Zhang Application of full-system simulation in exploratory system design and development. [Citation Graph (0, 0)][DBLP ] IBM Journal of Research and Development, 2006, v:50, n:2-3, pp:321-332 [Journal ] Chin-Tser Huang , Mohamed G. Gouda , E. N. Elnozahy Convergence of IPsec in presence of resets. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2006, v:15, n:2, pp:173-183 [Journal ] Patrick J. Bohrer , James L. Peterson , E. N. Elnozahy , Ramakrishnan Rajamony , Ahmed Gheith , Ronald L. Rockhold , Charles Lefurgy , Hazim Shafi , Tarun Nakra , Richard O. Simpson , Evan Speight , Kartik Sudeep , Eric Van Hensbergen , Lixin Zhang Mambo: a full system simulator for the PowerPC architecture. [Citation Graph (0, 0)][DBLP ] SIGMETRICS Performance Evaluation Review, 2004, v:31, n:4, pp:8-12 [Journal ] E. N. Elnozahy , Willy Zwaenepoel Manetho: Transparent Rollback-Recovery with Low Overhead, Limited Rollback, and Fast Output Commit. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1992, v:41, n:5, pp:526-531 [Journal ] Rami G. Melhem , Daniel Mossé , E. N. Elnozahy The Interplay of Power Management and Fault Recovery in Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2004, v:53, n:2, pp:217-231 [Journal ] J. Hamilton Slye , E. N. Elnozahy Support for Software Interrupts in Log-Based Rollback-Recovery. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1998, v:47, n:10, pp:1113-1123 [Journal ] E. N. Elnozahy , James S. Plank Checkpointing for Peta-Scale Systems: A Look into the Future of Practical Rollback-Recovery. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:2, pp:97-108 [Journal ] Mohamed G. Gouda , E. N. Elnozahy , Chin-Tser Huang , Tommy M. McGuire Hop integrity in computer networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2002, v:10, n:3, pp:308-319 [Journal ] E. N. Elnozahy Five Years with the High Productivity Computing Systems Program A Perspective. [Citation Graph (0, 0)][DBLP ] IPDPS, 2007, pp:1- [Conf ] A comparison of two approaches to build reliable distributed file servers. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs