Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless ACK Collisions Not Considered Harmful., , , and . HotNets, page 19-24. ACM SIGCOMM, (2008)Resource Allocation in Multi-armed Bandit Exploration: Overcoming Nonlinear Scaling with Adaptive Parallelism., , , , , and . CoRR, (2020)Population Based Augmentation: Efficient Learning of Augmentation Policy Schedules., , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 2731-2741. PMLR, (2019)Heterogeneity and load balance in distributed hash tables., and . INFOCOM, page 596-606. IEEE, (2005)A cost comparison of datacenter network architectures., , , , and . CoNEXT, page 16. ACM, (2010)Macroscope: end-point approach to networked application dependency discovery., , , , and . CoNEXT, page 229-240. ACM, (2009)End-host controlled multicast routing., , , and . Comput. Networks, 50 (6): 807-825 (2006)Load balancing in dynamic structured peer-to-peer systems., , , , and . Perform. Evaluation, 63 (3): 217-240 (2006)CloudPolice: taking access control out of the network., , , , and . HotNets, page 7. ACM, (2010)Shark: SQL and Rich Analytics at Scale, , , , , and . CoRR, (2012)