Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using advanced data structures to enable responsive security monitoring., , , , , , , , and . Clust. Comput., 25 (4): 2893-2914 (2022)The Online Event-Detection Problem., , , , , , , and . CoRR, (2018)IcebergHT: High Performance PMEM Hash Tables Through Stability and Low Associativity., , , , , , and . CoRR, (2022)Introduction to SODA 2002 and 2003 special issue., , and . ACM Trans. Algorithms, 3 (4): 36 (2007)Bootstrapping a hop-optimal network in the weak sensor model., , and . ACM Trans. Algorithms, 5 (4): 37:1-37:30 (2009)Finding frequent items in data streams., , and . Theor. Comput. Sci., 312 (1): 3-15 (2004)Preface., and . Theor. Comput. Sci., 382 (2): 85 (2007)Optimal spaced seeds for faster approximate string matching., , , and . J. Comput. Syst. Sci., 73 (7): 1035-1044 (2007)Vector Quotient Filters: Overcoming the Time/Space Trade-Off in Filter Design., , , , , and . SIGMOD Conference, page 1386-1399. ACM, (2021)GraphZeppelin: Storage-Friendly Sketching for Connected Components on Dynamic Graph Streams., , , , , , , , and . SIGMOD Conference, page 325-339. ACM, (2022)