Author of the publication

E-Storm: Replication-Based State Management in Distributed Stream Processing Systems.

, , , , and . ICPP, page 571-580. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks., and . CoRR, (2017)Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge, , and . CoRR, (2011)Validity: a framework for cross-disciplinary collaboration in mining indicators of learning from MOOC forums., , , , and . LAK, page 546-547. ACM, (2016)A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 556-570 (2016)DBA bandits: Self-driving index tuning under ad-hoc, analytical workloads with safety guarantees., , , and . CoRR, (2020)Machine Learning in Network Anomaly Detection: A Survey., , , , , and . IEEE Access, (2021)A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy., , , and . IEEE Trans. Inf. Theory, 68 (1): 538-548 (2022)Predicting dynamic spectrum allocation: a review covering simulation, modelling, and prediction., , , , and . Artif. Intell. Rev., 56 (10): 10921-10959 (October 2023)Geometric & Topological Representations of Maximum Classes with Applications to Sample Compression., and . COLT, page 299-310. Omnipress, (2008)No DBA? No regret! Multi-armed bandits for index tuning of analytical and HTAP workloads with provable guarantees., , , and . CoRR, (2021)