default search action
JoAnne Holliday
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j5]Quoc Le, Ahmed Amer, JoAnne Holliday:
RAID 4SMR: RAID Array with Shingled Magnetic Recording Disk for Mass Storage Systems. J. Comput. Sci. Technol. 34(4): 854-868 (2019) - 2015
- [c29]Quoc Minh Le, Ahmed Amer, JoAnne Holliday:
SMR Disks for Mass Storage Systems. MASCOTS 2015: 228-231 - 2014
- [c28]Vishnu S. Pendyala, Yi Fang, JoAnne Holliday, Ali Zalzala:
A text mining approach to automated healthcare for the masses. GHTC 2014: 28-35 - 2013
- [c27]Poongovan Ponnavaikko, Kamal Yassin, Sarah Kate Wilson, Milica Stojanovic, JoAnne Holliday:
Energy optimization with delay constraints in Underwater Acoustic Networks. GLOBECOM 2013: 551-556 - 2011
- [j4]Sarah Kate Wilson, JoAnne Holliday:
Scheduling methods for multi-user optical wireless asymmetrically-clipped OFDM. J. Commun. Networks 13(6): 655-663 (2011) - [c26]Garrey Learmonth, JoAnne Holliday:
NS3 simulation and analysis of MCCA: Multihop Clear Channel Assessment in 802.11 DCF. CCNC 2011: 198-202 - [c25]Quoc Minh Le, Kumar SathyanarayanaRaju, Ahmed Amer, JoAnne Holliday:
Workload Impact on Shingled Write Disks: All-Writes Can Be Alright. MASCOTS 2011: 444-446 - 2010
- [c24]Garrey Learmonth, JoAnne Holliday:
MCCA: Multihop Clear Channel Assessment In 802.11 DCF. CCNC 2010: 1-2 - [c23]Vishnu S. Pendyala, JoAnne Holliday:
Performing Intelligent Mobile Searches in the Cloud Using Semantic Technologies. GrC 2010: 381-386
2000 – 2009
- 2009
- [c22]Soohong Min, JoAnne Holliday:
Replacement policies for super-peer in unstructured P2P network. ISCIS 2009: 715-720 - [c21]Soohong Min, JoAnne Holliday:
Super-Peer Availability Prediction Strategy in Unstructured P2P Network. NPC 2009: 23-29 - 2007
- [c20]Chris Williams, Philippe Huibonhoa, JoAnne Holliday, Andy Hospodor, Thomas J. E. Schwarz:
Redundancy Management for P2P Storage. CCGRID 2007: 15-22 - [c19]Ping Ding, JoAnne Holliday:
A Dynamic Localized Minimum-Energy Agent Tree-Based Data Dissemination Scheme for Wireless Sensor Networks. ICA3PP 2007: 433-445 - 2006
- [c18]Aslihan Celik, JoAnne Holliday, Zachary Hurst:
Data Dissemination to a Large Mobile Network: Simulation of Broadcast Clouds. MDM 2006: 37 - 2005
- [c17]Ping Ding, JoAnne Holliday, Aslihan Celik:
Dynamic scheduling of PCF traffic in an unstable wireless LAN. CCNC 2005: 445-450 - [c16]Ping Ding, JoAnne Holliday, Aslihan Celik:
Distributed Energy-Efficient Hierarchical Clustering for Wireless Sensor Networks. DCOSS 2005: 322-339 - [c15]Ping Ding, JoAnne Holliday, Aslihan Celik:
DEMAC: an adaptive power control MAC protocol for ad-hoc networks. PIMRC 2005: 1389-1395 - 2004
- [c14]Aslihan Celik, JoAnne Holliday, Ping Ding:
Will It Rain Profit With Broadcast Clouds? AMCIS 2004: 340 - [c13]Ping Ding, JoAnne Holliday, Aslihan Celik:
Improving the security of wireless LANs by managing 802.1x disassociation. CCNC 2004: 53-58 - [c12]Aslihan Celik, Ping Ding, JoAnne Holliday:
Data Broadcasting with Data Item Locality and Client Mobility. Mobile Data Management 2004: 166 - 2003
- [j3]Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramavarjula:
I-DG and HI-DG: Scalable and Efficient Techniques for Subscription-Based Data Dissemination via IP Multicasting. Electron. Commer. Res. 3(1-2): 143-165 (2003) - [j2]JoAnne Holliday, Robert C. Steinke, Divyakant Agrawal, Amr El Abbadi:
Epidemic Algorithms for Replicated Databases. IEEE Trans. Knowl. Data Eng. 15(5): 1218-1238 (2003) - 2002
- [j1]JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi:
Disconnection Modes for Mobile Databases. Wirel. Networks 8(4): 391-402 (2002) - [c11]JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi:
Partial Database Replication using Epidemic Communication. ICDCS 2002: 485-493 - [c10]Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramavarjula:
I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast. WECWIS 2002: 113-120 - [c9]Jui-Hua Li, JoAnne Holliday, George Fegan:
General applications 2: decision making of embedded I/O buffer sizes using the queueing simulation model for a shared-memory system. WSC 2002: 2017-2021 - 2001
- [c8]JoAnne Holliday:
Replicated Database Recovery Using Multicast Communication. NCA 2001: 104-107 - [c7]Kai Shen, Tao Yang, Lingkun Chu, JoAnne Holliday, Douglas A. Kuschner, Huican Zhu:
Neptune: Scalable Replication Management and Programming Support for Cluster-based Network Services. USITS 2001: 197-208 - 2000
- [c6]JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi:
Planned Disconnections for Mobile Databases. DEXA Workshop 2000: 165-172 - [c5]JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi:
Database Replication Using Epidemic Communication. Euro-Par 2000: 427-434 - [c4]JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi:
Exploiting Planned Disconnections in Mobile Environments. RIDE 2000: 25-30 - [c3]JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi:
Using Multicast Communication to Reduce Deadlock in Replicated Databases. SRDS 2000: 196-205
1990 – 1999
- 1999
- [c2]JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi:
The Performance of Database Replication with Group Multicast. FTCS 1999: 158-165 - [c1]JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi:
Database Replication: If You Must be Lazy, be Consistent. SRDS 1999: 304-305
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 17:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint