Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudPolice: taking access control out of the network., , , , and . HotNets, page 7. ACM, (2010)Ray: A Distributed Framework for Emerging AI Applications., , , , , , , , and . CoRR, (2017)Shark: SQL and Rich Analytics at Scale, , , , , and . CoRR, (2012)Population Based Augmentation: Efficient Learning of Augmentation Policy Schedules., , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 2731-2741. PMLR, (2019)Heterogeneity and load balance in distributed hash tables., and . INFOCOM, page 596-606. IEEE, (2005)End-host controlled multicast routing., , , and . Comput. Networks, 50 (6): 807-825 (2006)Load balancing in dynamic structured peer-to-peer systems., , , , and . Perform. Evaluation, 63 (3): 217-240 (2006)Host Mobility Using an Internet Indirection Infrastructure., , , , and . Wireless Networks, 11 (6): 741-756 (2005)OverQoS: offering Internet QoS using overlays., , , and . Comput. Commun. Rev., 33 (1): 11-16 (2003)Resource Allocation in Multi-armed Bandit Exploration: Overcoming Nonlinear Scaling with Adaptive Parallelism., , , , , and . CoRR, (2020)