default search action
Windsor W. Hsu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Huiba Li, Zhihao Zhang, Yifan Yuan, Rui Du, Kai Ma, Lanzheng Liu, Yiming Zhang, Windsor Hsu:
Block-level Image Service for the Cloud. ACM Trans. Storage 20(1): 1:1-1:28 (2024) - 2021
- [c20]Qianbo Huai, Windsor Hsu, Jiwei Lu, Hao Liang, Haobo Xu, Wei Chen:
XFUSE: An Infrastructure for Running Filesystem Services in User Space. USENIX ATC 2021: 863-875 - 2020
- [c19]Huiba Li, Yifan Yuan, Rui Du, Kai Ma, Lanzheng Liu, Windsor Hsu:
DADI: Block-Level Image Service for Agile and Elastic Application Deployment. USENIX ATC 2020: 727-740
2010 – 2019
- 2015
- [j11]Ao Ma, Rachel Traylor, Fred Douglis, Mark Chamness, Guanlin Lu, Darren Sawyer, Surendar Chandra, Windsor Hsu:
RAIDShield: Characterizing, Monitoring, and Proactively Protecting Against Disk Failures. ACM Trans. Storage 11(4): 17:1-17:28 (2015) - [c18]Ao Ma, Fred Douglis, Guanlin Lu, Darren Sawyer, Surendar Chandra, Windsor W. Hsu:
RAIDShield: Characterizing, Monitoring, and Proactively Protecting Against Disk Failures. FAST 2015: 241-256 - 2014
- [c17]Surendar Chandra, Windsor W. Hsu:
Lossless Medical Image Compression in a Block-Based Storage System. DCC 2014: 400 - 2013
- [c16]Fabiano C. Botelho, Philip Shilane, Nitin Garg, Windsor Hsu:
Memory efficient sanitization of a deduplicated storage system. FAST 2013: 81-94 - [c15]Stephen Smaldone, Grant Wallace, Windsor Hsu:
Efficiently Storing Virtual Machine Backups. HotStorage 2013 - [c14]Hyong Shim, Philip Shilane, Windsor Hsu:
Characterization of Incremental Data Changes for Efficient Data Protection. USENIX ATC 2013: 157-168 - 2012
- [j10]Philip Shilane, Mark Huang, Grant Wallace, Windsor Hsu:
WAN-optimized replication of backup datasets using stream-informed delta compression. ACM Trans. Storage 8(4): 13:1-13:26 (2012) - [c13]Grant Wallace, Fred Douglis, Hangwei Qian, Philip Shilane, Stephen Smaldone, Mark Chamness, Windsor Hsu:
Characteristics of backup workloads in production systems. FAST 2012: 4 - [c12]Philip Shilane, Mark Huang, Grant Wallace, Windsor Hsu:
WAN optimized replication of backup datasets using stream-informed delta compression. FAST 2012: 5 - [c11]Philip Shilane, Grant Wallace, Mark Huang, Windsor Hsu:
Delta Compressed and Deduplicated Storage Using Stream-Informed Locality. HotStorage 2012
2000 – 2009
- 2008
- [j9]Soumyadeb Mitra, Marianne Winslett, Windsor W. Hsu, Kevin Chen-Chuan Chang:
Trustworthy keyword search for compliance storage. VLDB J. 17(2): 225-242 (2008) - [c10]Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang:
Access Control Friendly Query Verification for Outsourced Data Publishing. ESORICS 2008: 177-191 - [c9]Soumyadeb Mitra, Marianne Winslett, Windsor W. Hsu:
Query-based partitioning of documents and indexes for information lifecycle management. SIGMOD Conference 2008: 623-636 - [p1]Ragib Hasan, Marianne Winslett, Soumyadeb Mitra, Windsor W. Hsu, Radu Sion:
Trustworthy Records Retention. Handbook of Database Security 2008: 357-381 - 2007
- [j8]Windsor W. Hsu, Shauchi Ong:
Technical Forum : WORM storage is not enough. IBM Syst. J. 46(2): 363-369 (2007) - [c8]Soumyadeb Mitra, Marianne Winslett, Windsor W. Hsu, Xiaonan Ma:
Trustworthy Migration and Retrieval of Regulatory Compliant Records. MSST 2007: 100-113 - 2006
- [c7]Soumyadeb Mitra, Windsor W. Hsu, Marianne Winslett:
Trustworthy Keyword Search for Regulatory-Compliant Record Retention. VLDB 2006: 1001-1012 - 2005
- [j7]Windsor W. Hsu, Alan Jay Smith, Honesty C. Young:
The automatic improvement of locality in storage systems. ACM Trans. Comput. Syst. 23(4): 424-473 (2005) - [c6]Qingbo Zhu, Windsor W. Hsu:
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records. SIGMOD Conference 2005: 395-406 - 2004
- [j6]Windsor W. Hsu, Alan Jay Smith:
The performance impact of I/O optimizations and disk improvements. IBM J. Res. Dev. 48(2): 255-289 (2004) - 2003
- [j5]Windsor W. Hsu, Alan Jay Smith:
Characteristics of I/O traffic in personal computer and server workloads. IBM Syst. J. 42(2): 347-372 (2003) - 2001
- [j4]Windsor W. Hsu, Alan Jay Smith, Honesty C. Young:
Characteristics of production database workloads and the TPC benchmarks. IBM Syst. J. 40(3): 781-802 (2001) - [j3]Windsor W. Hsu, Alan Jay Smith, Honesty C. Young:
I/O reference behavior of production database workloads and the TPC benchmarks - an analysis at the logical level. ACM Trans. Database Syst. 26(1): 96-143 (2001) - 2000
- [j2]Jih-Kwon Peir, Windsor W. Hsu, Honesty C. Young, Shauchi Ong:
Improving cache performance with Full-Map Block Directory. J. Syst. Archit. 46(5): 439-454 (2000) - [c5]Ying Chen, Windsor W. Hsu, Honesty C. Young:
Logging RAID - An Approach to Fast, Reliable, and Low-Cost Disk Arrays. Euro-Par 2000: 1302-1312 - [c4]Windsor W. Hsu, Alan Jay Smith, Honesty C. Young:
Projecting the Performance of Decision Support Workloads on Systems with Smart Storage (SmartSTOR). ICPADS 2000: 417-425
1990 – 1999
- 1999
- [j1]Jih-Kwon Peir, Windsor W. Hsu, Alan Jay Smith:
Functional Implementation Techniques for CPU Cache Memories. IEEE Trans. Computers 48(2): 100-110 (1999) - 1998
- [c3]Jih-Kwon Peir, Yongjoon Lee, Windsor W. Hsu:
Capturing Dynamic Memory Reference Behavior with Adaptive Cache Topology. ASPLOS 1998: 240-250 - 1997
- [c2]Jih-Kwon Peir, Windsor W. Hsu:
Fast Cache Access with Full-Map Block Directory. ICCD 1997: 578-586 - [r1]Windsor W. Hsu, Jih-Kwon Peir:
Busses. The Computer Science and Engineering Handbook 1997: 427-446 - 1996
- [c1]Jih-Kwon Peir, Windsor W. Hsu, Honesty C. Young, Shauchi Ong:
Improving Cache Performance with Balanced Tag and Data Paths. ASPLOS 1996: 268-278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint