The SCEAS System
Navigation Menu

Search the dblp DataBase


Aydan R. Yumerefendi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ryan Huebsch, Brent N. Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica, Aydan R. Yumerefendi
    The Architecture of PIER: an Internet-Scale Query Processor. [Citation Graph (0, 0)][DBLP]
    CIDR, 2005, pp:28-43 [Conf]
  2. Piyush Shivam, Adriana Iamnitchi, Aydan R. Yumerefendi, Jeffrey S. Chase
    Model-Driven Placement of Compute Tasks and Data in a Networked Utility. [Citation Graph (0, 0)][DBLP]
    ICAC, 2005, pp:344-345 [Conf]
  3. Lavanya Ramakrishnan, David E. Irwin, Laura E. Grit, Aydan R. Yumerefendi, Adriana Iamnitchi, Jeffrey S. Chase
    Grid allocation and reservation - Toward a doctrine of containment: grid hosting with adaptive resource control. [Citation Graph (0, 0)][DBLP]
    SC, 2006, pp:101- [Conf]
  4. David E. Irwin, Jeffrey S. Chase, Laura E. Grit, Aydan R. Yumerefendi, David Becker, Ken Yocum
    Sharing Networked Resources with Brokered Leases. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:199-212 [Conf]
  5. Aydan R. Yumerefendi, Benjamin Mickle, Landon P. Cox
    TightLip: Keeping Applications from Spilling the Beans. [Citation Graph (0, 0)][DBLP]
    NSDI, 2007, pp:- [Conf]
  6. Piyush Shivam, Azbayar Demberel, Pradeep Gunda, David E. Irwin, Laura E. Grit, Aydan R. Yumerefendi, Shivnath Babu, Jeffrey S. Chase
    Automated and on-demand provisioning of virtual machines for database applications. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2007, pp:1079-1081 [Conf]
  7. Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon
    Authorizing applications in singularity. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:355-368 [Conf]
  8. Aydan R. Yumerefendi, Jeffrey S. Chase
    Strong accountability for network storage. [Citation Graph (0, 0)][DBLP]
    TOS, 2007, v:3, n:3, pp:- [Journal]

  9. Secure control of portable images in a virtual computing utility. [Citation Graph (, )][DBLP]

  10. Strong Accountability for Network Storage. [Citation Graph (, )][DBLP]

  11. Trust but verify: accountability for network services. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002