Author of the publication

Bipartite-oriented distributed graph partitioning for big learning.

, , , and . APSys, page 14:1-14:7. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

X10-FT: Transparent fault tolerance for APGAS language and runtime., , , and . Parallel Comput., 40 (2): 136-156 (2014)Fast Consensus Using Bounded Staleness for Scalable Read-Mostly Synchronization., , , , and . IEEE Trans. Parallel Distributed Syst., 27 (12): 3485-3500 (2016)A New Approach to Pointer Analysis for Assignments., , , and . J. Comput. Sci. Technol., 16 (3): 242-250 (2001)Colony: A Privileged Trusted Execution Environment With Extensibility., , , , , , and . IEEE Trans. Computers, 71 (2): 479-492 (2022)General and Fast Inter-Process Communication via Bypassing Privileged Software., , , and . IEEE Trans. Computers, 71 (10): 2435-2448 (2022)DrTM+B: Replication-Driven Live Reconfiguration for Fast and General Distributed Transaction Processing., , , , and . IEEE Trans. Parallel Distributed Syst., 33 (10): 2628-2643 (2022)XStore: Fast RDMA-Based Ordered Key-Value Store Using Remote Learned Cache., , , and . ACM Trans. Storage, 17 (3): 18:1-18:32 (2021)Espresso: Brewing Java For More Non-Volatility with Non-volatile Memory., , , , , , and . CoRR, (2017)Greedy map generalization by iterative point removal., , , , and . SIGSPATIAL/GIS, page 617-620. ACM, (2014)You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps., , , , , and . USENIX Security Symposium, page 657-690. USENIX Association, (2015)