Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomized algorithms, and . ACM Computing Surveys, 28 (1): 33-37 (1996)Stream: The Stanford data stream management system, , , , , , , and . Stanford InfoLab, (2004)Sampling from a moving window over streaming data, , , and . Proceedings of PODS'03, page 234--243. (2003)Maintaining stream statistics over sliding windows, , , and . Proceedings of SODA'02, page 635--644. (2002)A Visibility-Based Pursuit-Evasion Problem., , , , and . Int. J. Comput. Geom. Appl., 9 (4/5): 471-494 (1999)Randomized Query Processing in Robot Path Planning., , , and . J. Comput. Syst. Sci., 57 (1): 50-66 (1998)A 1.43-Competitive Online Graph Edge Coloring Algorithm in the Random Order Arrival Model., , and . SODA, page 31-39. SIAM, (2010)Covering Orthogonal Polygons with Star Polygons: The Perfect Graph Approach., , and . SCG, page 211-223. ACM, (1988)Two Can Keep A Secret: A Distributed Architecture for Secure Database Services., , , , , , , , and . CIDR, page 186-199. www.cidrdb.org, (2005)Query Processing, Approximation, and Resource Management in a Data Stream Management System., , , , , , , , , and . CIDR, www.cidrdb.org, (2003)