default search action
E. N. Elnozahy
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j12]Elmootazbellah (Mootaz) Elnozahy:
Building a research university in the Arab region: the case of KAUST. Commun. ACM 64(4): 46-49 (2021) - 2006
- [j11]James L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang:
Application of full-system simulation in exploratory system design and development. IBM J. Res. Dev. 50(2-3): 321-332 (2006) - [j10]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in presence of resets. J. High Speed Networks 15(2): 173-183 (2006) - 2004
- [j9]Patrick J. Bohrer, James L. Peterson, E. N. Elnozahy, Ramakrishnan Rajamony, Ahmed Gheith, Ronald L. Rockhold, Charles Lefurgy, Hazim Shafi, Tarun Nakra, Richard O. Simpson, Evan Speight, Kartik Sudeep, Eric Van Hensbergen, Lixin Zhang:
Mambo: a full system simulator for the PowerPC architecture. SIGMETRICS Perform. Evaluation Rev. 31(4): 8-12 (2004) - [j8]Rami G. Melhem, Daniel Mossé, E. N. Elnozahy:
The Interplay of Power Management and Fault Recovery in Real-Time Systems. IEEE Trans. Computers 53(2): 217-231 (2004) - [j7]E. N. Elnozahy, James S. Plank:
Checkpointing for Peta-Scale Systems: A Look into the Future of Practical Rollback-Recovery. IEEE Trans. Dependable Secur. Comput. 1(2): 97-108 (2004) - 2003
- [j6]E. N. Elnozahy, Rajiv V. Joshi:
Preface. IBM J. Res. Dev. 47(5-6): 521-524 (2003) - 2002
- [j5]E. N. Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson:
A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. 34(3): 375-408 (2002) - [j4]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire:
Hop integrity in computer networks. IEEE/ACM Trans. Netw. 10(3): 308-319 (2002) - 2001
- [j3]Bishop Brock, Gary D. Carpenter, Eli Chiprout, Mark E. Dean, Philippe L. De Backer, E. N. Elnozahy, Hubertus Franke, Mark Giampapa, David Glasco, James L. Peterson, Ramakrishnan Rajamony, Rajan Ravindran, Freeman L. Rawson III, Ronald L. Rockhold, Juan Rubio:
Experience with building a commodity Intel-based ccNUMA system. IBM J. Res. Dev. 45(2): 207-228 (2001) - 1998
- [j2]J. Hamilton Slye, E. N. Elnozahy:
Support for Software Interrupts in Log-Based Rollback-Recovery. IEEE Trans. Computers 47(10): 1113-1123 (1998) - 1992
- [j1]E. N. Elnozahy, Willy Zwaenepoel:
Manetho: Transparent Rollback-Recovery with Low Overhead, Limited Rollback, and Fast Output Commit. IEEE Trans. Computers 41(5): 526-531 (1992)
Conference and Workshop Papers
- 2011
- [c27]Wei Huang, Malcolm Allen-Ware, John B. Carter, E. N. Elnozahy, Hendrik F. Hamann, Tom W. Keller, Charles Lefurgy, Jian Li, Karthick Rajamani, Juan Rubio:
TAPO: Thermal-aware power optimization techniques for servers and data centers. IGCC 2011: 1-8 - 2007
- [c26]E. N. Elnozahy:
Five Years with the High Productivity Computing Systems Program A Perspective. IPDPS 2007: 1 - 2006
- [c25]E. N. Elnozahy:
Four Years with the High Productivity Computing Systems Program - A Perspective. ICPP 2006 - 2004
- [c24]Dakai Zhu, Rami G. Melhem, Daniel Mossé, Elmootazbellah (Mootaz) Elnozahy:
Analysis of an Energy Efficient Optimistic TMR Scheme. ICPADS 2004: 559-568 - 2003
- [c23]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in Presence of Resets. ICDCS Workshops 2003: 22-27 - [c22]E. N. Elnozahy, Michael Kistler, Ramakrishnan Rajamony:
Energy Conservation Policies for Web Servers. USENIX Symposium on Internet Technologies and Systems 2003 - 2002
- [c21]Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy:
Key Trees and the Security of Interval Multicast. ICDCS 2002: 467-468 - [c20]E. N. Elnozahy, Michael Kistler, Ramakrishnan Rajamony:
Energy-Efficient Server Clusters. PACS 2002: 179-196 - [c19]E. N. Elnozahy, Rami G. Melhem, Daniel Mossé:
Energy-Efficient Duplex and TMR Real-Time Systems. RTSS 2002: 256-266 - 2001
- [c18]Ramakrishnan Rajamony, Elmootazbellah (Mootaz) Elnozahy:
Measuring Client-Perceived Response Time on the WWW. USITS 2001 - 2000
- [c17]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire:
Hop Integrity in Computer Networks. ICNP 2000: 3-11 - 1999
- [c16]Lorenzo Alvisi, E. N. Elnozahy, Sriram Rao, Syed Amir Husain, Asanka De Mel:
An Analysis of Communication Induced Checkpointing. FTCS 1999: 242-249 - [c15]E. N. Elnozahy:
Address Trace Compression Through Loop Detection and Reduction. SIGMETRICS 1999: 214-215 - 1998
- [c14]E. N. Elnozahy:
How Safe is Probabilistic Checkpointing? FTCS 1998: 358-363 - 1997
- [c13]Yi-Min Wang, Pi-Yu Chung, Yennun Huang, E. N. Elnozahy:
Integrating Checkpointing with Transaction Processing. FTCS 1997: 304-308 - 1996
- [c12]J. Hamilton Slye, E. N. Elnozahy:
Supporting Nondeterministic Execution in Fault-Tolerant Systems. FTCS 1996: 250-259 - [c11]B. Acevedo, L. Bahler, E. N. Elnozahy, Vivek Ratan, Mark E. Segal:
Highly Available Directory Services in DCE. FTCS 1996: 387-391 - 1995
- [c10]E. N. Elnozahy:
On the Relevance of Communication Costs of Rollback-Recovery Protocols. PODC 1995: 74-79 - 1994
- [c9]E. N. Elnozahy, Willy Zwaenepoel:
On the Use and Implementation of Message Logging. FTCS 1994: 298-307 - 1993
- [c8]E. N. Elnozahy:
Fault Tolerance for Clusters of Workstations. Hardware and Software Architectures for Fault Tolerance 1993: 151-158 - 1992
- [c7]E. N. Elnozahy, Willy Zwaenepoel:
Replicated Distributed Process in Manetho. FTCS 1992: 18-27 - [c6]John K. Bennett, John B. Carter, Alan L. Cox, E. N. Elnozahy, David B. Johnson, Peter J. Keleher, Willy Zwaenepoel:
Distributed shared memory: experience with Munin. ACM SIGOPS European Workshop 1992 - [c5]E. N. Elnozahy, David B. Johnson, Willy Zwaenepoel:
The Performance of Consistent Checkpointing. SRDS 1992: 39-47 - [c4]E. N. Elnozahy, Willy Zwaenepoel:
An Integrated Approach to Fault Tolerance. Workshop on the Management of Replicated Data 1992: 82-85 - 1991
- [c3]Anupam Bhide, E. N. Elnozahy, Stephen P. Morgan, A. Siegel:
A comparison of two approaches to build reliable distributed file servers. ICDCS 1991: 616-623 - [c2]Anupam Bhide, E. N. Elnozahy, Stephen P. Morgan:
A Highly Available Network File Server. USENIX Winter 1991: 199-206 - 1990
- [c1]Anupam Bhide, E. N. Elnozahy, Stephen P. Morgan:
Implicit Replication in a Network File Server. Workshop on the Management of Replicated Data 1990: 85-90
Reference Works
- 2011
- [r1]E. N. Elnozahy, Evan Speight, Jian Li, Ramakrishnan Rajamony, Lixin Zhang, L. Baba Arimilli:
PERCS System Architecture. Encyclopedia of Parallel Computing 2011: 1506-1515
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint