Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-optimal Algorithms for Generalized Dominance Computation and Related Problems on Mesh Connected Computers and Meshes with Multiple Broadcasting.. Parallel Algorithms Appl., 8 (3-4): 271-283 (1996)CloudPolice: taking access control out of the network., , , , and . HotNets, page 7. ACM, (2010)OverQoS: offering Internet QoS using overlays., , , and . Comput. Commun. Rev., 33 (1): 11-16 (2003)Wireless ACK Collisions Not Considered Harmful., , , and . HotNets, page 19-24. ACM SIGCOMM, (2008)Resource Allocation in Multi-armed Bandit Exploration: Overcoming Nonlinear Scaling with Adaptive Parallelism., , , , , and . CoRR, (2020)AutoPandas: neural-backed generators for program synthesis., , , , and . Proc. ACM Program. Lang., 3 (OOPSLA): 168:1-168:27 (2019)Load balancing in dynamic structured peer-to-peer systems., , , , and . Perform. Evaluation, 63 (3): 217-240 (2006)ODR: output-deterministic replay for multicore debugging., and . SOSP, page 193-206. ACM, (2009)Ray: A Distributed Framework for Emerging AI Applications., , , , , , , , and . CoRR, (2017)Shark: SQL and Rich Analytics at Scale, , , , , and . CoRR, (2012)