Author of the publication

When Good-Enough is Enough: Complex Queries at Fixed Cost.

, , , and . BigDataService, page 89-98. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gumshoe: Diagnosing Performance Problems in Replicated File-Systems., , and . SRDS, page 137-146. IEEE Computer Society, (2008)Practical experiences with chronics discovery in large telecommunications systems., , , , , and . ACM SIGOPS Oper. Syst. Rev., 45 (3): 23-30 (2011)Poster: Approximate Memoization for Perception-based Mobile Applications., , , and . MobiSys (Companion Volume), page 131. ACM, (2016)Krowd: A Key-Value Store for Crowded Venues., , , and . MobiArch, page 20-25. ACM, (2015)Draco: Statistical diagnosis of chronic problems in large distributed systems., , , , , and . DSN, page 1-12. IEEE Computer Society, (2012)When Good-Enough is Enough: Complex Queries at Fixed Cost., , , and . BigDataService, page 89-98. IEEE Computer Society, (2015)Quantization to maximize SNR in non-orthogonal subband coders., and . ICASSP, page 3689-3692. IEEE, (2001)Short paper: CHIPS: content-based heuristics for improving photo privacy for smartphones., , , , and . WISEC, page 213-218. ACM, (2014)The next-generation in-stadium experience (keynote)., , , , and . GPCE, page 1-10. ACM, (2015)PCFIRE: towards provable <u>p</u>reventative <u>c</u>ontrol-<u>f</u>low <u>i</u>ntegrity enforcement for <u>r</u>ealistic <u>e</u>mbedded software., , , , and . EMSOFT, page 19:1-19:10. ACM, (2016)