Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Force-directed approaches to sensor localization, , , , , and . TOSN, (2010)Shaping the Evolution of Mobile Commerce., , and . Encyclopedia of Information Science and Technology (V), Idea Group, (2005)Visualizing the Behavior of Dynamically Modifiable Code., , , , and . IWPC, page 337-340. IEEE Computer Society, (2005)Force-Directed Approaches to Sensor Network Localization., , , and . Algorithmic Aspects of Large and Complex Networks, volume 05361 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)Hardware Architecture and Software Stack for PIM Based on Commercial DRAM Technology : Industrial Product., , , , , , , , , and 6 other author(s). ISCA, page 43-56. IEEE, (2021)Force-Directed Approaches to Sensor Localization., , , , and . ALENEX, page 108-118. SIAM, (2006)Proactive, Accuracy-aware Straggler Mitigation in Machine Learning Clusters., , and . IPDPS (Workshops), page 1196-1198. IEEE, (2024)A general framework for comparing operating policies in manufacturing cells., and . Ann. Oper. Res., (1998)An Efficient Bandit Algorithm for Realtime Multivariate Optimization., , , , and . CoRR, (2018)USHER: Holistic Interference Avoidance for Resource Optimized ML Inference., , and . OSDI, page 947-964. USENIX Association, (2024)