Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global graphs: A middleware for large scale graph processing., , and . IEEE BigData, page 33-40. IEEE Computer Society, (2014)Hash in a Flash: Hash Tables for Solid State Devices, , , , and . CoRR, (2012)One, Two, Hash! Counting Hash Tables for Flash Devices., , , , and . CODS, page 1-10. ACM, (2014)Edge importance identification for energy efficient graph processing., , , , , and . IEEE BigData, page 347-354. IEEE Computer Society, (2015)Hash in a flash: Hash tables for flash devices., , , , and . IEEE BigData, page 7-14. IEEE Computer Society, (2013)b-HiVE: a bit-level history-based error model with value correlation for voltage-scaled integer and floating point units., , , , , and . DAC, page 105:1-105:6. ACM, (2015)Network Clustering., and . Data Clustering: Algorithms and Applications, CRC Press, (2013)Lazy Pipelines: Enhancing quality in approximate computing., , , , , and . DATE, page 1381-1386. IEEE, (2016)A fast implementation of MLR-MCL algorithm on multi-core processors., , , , and . HiPC, page 1-10. IEEE Computer Society, (2014)Hybrid Steganography: A Multi-Layered Framework for Hybrid Text and Image Concealment Enhanced by AES and LSB Techniques., , , , , , and . SIN, page 1-6. IEEE, (2023)