The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

E. N. Elnozahy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. B. Acevedo, L. Bahler, E. N. Elnozahy, V. Ratan, M. E. Segal
    Highly Available Directory Services in DCE. [Citation Graph (0, 0)][DBLP]
    FTCS, 1996, pp:387-391 [Conf]
  2. Lorenzo Alvisi, E. N. Elnozahy, Sriram Rao, Syed Amir Husain, Asanka De Mel
    An Analysis of Communication Induced Checkpointing. [Citation Graph (0, 0)][DBLP]
    FTCS, 1999, pp:242-249 [Conf]
  3. E. N. Elnozahy
    How Safe is Probabilistic Checkpointing? [Citation Graph (0, 0)][DBLP]
    FTCS, 1998, pp:358-363 [Conf]
  4. E. N. Elnozahy, Willy Zwaenepoel
    Replicated Distributed Process in Manetho. [Citation Graph (0, 0)][DBLP]
    FTCS, 1992, pp:18-27 [Conf]
  5. E. N. Elnozahy, Willy Zwaenepoel
    On the Use and Implementation of Message Logging. [Citation Graph (0, 0)][DBLP]
    FTCS, 1994, pp:298-307 [Conf]
  6. J. Hamilton Slye, E. N. Elnozahy
    Supporting Nondeterministic Execution in Fault-Tolerant Systems. [Citation Graph (0, 0)][DBLP]
    FTCS, 1996, pp:250-259 [Conf]
  7. Yi-Min Wang, Pi-Yu Chung, Yennun Huang, E. N. Elnozahy
    Integrating Checkpointing with Transaction Processing. [Citation Graph (0, 0)][DBLP]
    FTCS, 1997, pp:304-308 [Conf]
  8. E. N. Elnozahy
    Fault Tolerance for Clusters of Workstations. [Citation Graph (0, 0)][DBLP]
    Hardware and Software Architectures for Fault Tolerance, 1993, pp:151-158 [Conf]
  9. Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy
    Key Trees and the Security of Interval Multicast. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:467-468 [Conf]
  10. Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
    Convergence of IPsec in Presence of Resets. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:22-27 [Conf]
  11. Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire
    Hop Integrity in Computer Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2000, pp:3-11 [Conf]
  12. E. N. Elnozahy
    Four Years with the High Productivity Computing Systems Program - A Perspective. [Citation Graph (0, 0)][DBLP]
    ICPP, 2006, pp:- [Conf]
  13. E. N. Elnozahy, Michael Kistler, Ramakrishnan Rajamony
    Energy-Efficient Server Clusters. [Citation Graph (0, 0)][DBLP]
    PACS, 2002, pp:179-196 [Conf]
  14. E. N. Elnozahy
    On the Relevance of Communication Costs of Rollback-Recovery Protocols. [Citation Graph (0, 0)][DBLP]
    PODC, 1995, pp:74-79 [Conf]
  15. E. N. Elnozahy, Rami G. Melhem, Daniel Mossé
    Energy-Efficient Duplex and TMR Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 2002, pp:256-0 [Conf]
  16. E. N. Elnozahy
    Address Trace Compression Through Loop Detection and Reduction. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1999, pp:214-215 [Conf]
  17. John K. Bennett, John B. Carter, Alan L. Cox, E. N. Elnozahy, David B. Johnson, Peter J. Keleher, Willy Zwaenepoel
    Distributed shared memory: experience with Munin. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1992, pp:- [Conf]
  18. E. N. Elnozahy, David B. Johnson, Willy Zwaenepoel
    The Performance of Consistent Checkpointing. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1992, pp:39-47 [Conf]
  19. Anupam Bhide, E. N. Elnozahy, Stephen P. Morgan
    A Highly Available Network File Server. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1991, pp:199-206 [Conf]
  20. E. N. Elnozahy, Michael Kistler, Ramakrishnan Rajamony
    Energy Conservation Policies for Web Servers. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 2003, pp:- [Conf]
  21. Anupam Bhide, E. N. Elnozahy, Stephen P. Morgan
    Implicit Replication in a Network File Server. [Citation Graph (0, 0)][DBLP]
    Workshop on the Management of Replicated Data, 1990, pp:85-90 [Conf]
  22. E. N. Elnozahy, Willy Zwaenepoel
    An Integrated Approach to Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    Workshop on the Management of Replicated Data, 1992, pp:82-85 [Conf]
  23. E. N. Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson
    A survey of rollback-recovery protocols in message-passing systems. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2002, v:34, n:3, pp:375-408 [Journal]
  24. Bishop Brock, Gary D. Carpenter, Eli Chiprout, Mark E. Dean, Philippe L. De Backer, E. N. Elnozahy, Hubertus Franke, Mark Giampapa, David Glasco, James L. Peterson, Ramakrishnan Rajamony, Rajan Ravindran, Freeman L. Rawson III, Ronald L. Rockhold, Juan Rubio
    Experience with building a commodity Intel-based ccNUMA system. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2001, v:45, n:2, pp:207-228 [Journal]
  25. E. N. Elnozahy, Rajiv V. Joshi
    Preface. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2003, v:47, n:5-6, pp:521-524 [Journal]
  26. James L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang
    Application of full-system simulation in exploratory system design and development. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2006, v:50, n:2-3, pp:321-332 [Journal]
  27. Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
    Convergence of IPsec in presence of resets. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:2, pp:173-183 [Journal]
  28. Patrick J. Bohrer, James L. Peterson, E. N. Elnozahy, Ramakrishnan Rajamony, Ahmed Gheith, Ronald L. Rockhold, Charles Lefurgy, Hazim Shafi, Tarun Nakra, Richard O. Simpson, Evan Speight, Kartik Sudeep, Eric Van Hensbergen, Lixin Zhang
    Mambo: a full system simulator for the PowerPC architecture. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 2004, v:31, n:4, pp:8-12 [Journal]
  29. E. N. Elnozahy, Willy Zwaenepoel
    Manetho: Transparent Rollback-Recovery with Low Overhead, Limited Rollback, and Fast Output Commit. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1992, v:41, n:5, pp:526-531 [Journal]
  30. Rami G. Melhem, Daniel Mossé, E. N. Elnozahy
    The Interplay of Power Management and Fault Recovery in Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:2, pp:217-231 [Journal]
  31. J. Hamilton Slye, E. N. Elnozahy
    Support for Software Interrupts in Log-Based Rollback-Recovery. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:10, pp:1113-1123 [Journal]
  32. E. N. Elnozahy, James S. Plank
    Checkpointing for Peta-Scale Systems: A Look into the Future of Practical Rollback-Recovery. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:2, pp:97-108 [Journal]
  33. Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire
    Hop integrity in computer networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2002, v:10, n:3, pp:308-319 [Journal]
  34. E. N. Elnozahy
    Five Years with the High Productivity Computing Systems Program A Perspective. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1- [Conf]

  35. A comparison of two approaches to build reliable distributed file servers. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002