Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallelizing stateful operators in a distributed stream processing system: how, should you and how much?, , , and . DEBS, page 278-289. ACM, (2012)Frequent Update and Efficient Retrieval: an Oxymoron on Moving Object Indexes?, , and . WISE Workshops, page 3-12. IEEE Computer Society, (2002)DUET: A Tuning-Free Device-Cloud Collaborative Parameters Generation Framework for Efficient Device Model Generalization., , , , , , , , , and 1 other author(s). WWW, page 3077-3085. ACM, (2023)Building CyberBroker in Digital Marketplaces Using Java and CORBA., , and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 1086-1095. Springer, (1999)Characterizing Cryptocurrency-themed Malicious Browser Extensions., , , , , , , and . SIGMETRICS (Abstracts), page 91-92. ACM, (2023)A Transactional Perspective on Execute-order-validate Blockchains., , , , , and . SIGMOD Conference, page 543-557. ACM, (2020)First Workshop on Verifiable Database Systems., , and . SIGMOD Conference Companion, page 315-316. ACM, (2023)DADA: a data cube for dominant relationship analysis., , , and . SIGMOD Conference, page 659-670. ACM, (2006)Continuous sampling for online aggregation over multiple queries., , and . SIGMOD Conference, page 651-662. ACM, (2010)A Fusion-Denoising Attack on InstaHide with Data Augmentation., , , , and . AAAI, page 1899-1907. AAAI Press, (2022)