Author of the publication

Toward Scalable Indexing and Search on Distributed and Unstructured Data.

, , , , and . BigData Congress, page 31-38. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation., , , , , , , and . USENIX Security Symposium, page 1183-1200. USENIX Association, (2020)Solving SQL Constraints by Incremental Translation to SAT., , and . IEA/AIE, volume 5027 of Lecture Notes in Computer Science, page 669-676. Springer, (2008)Exploring reliability of exascale systems through simulations., , , and . SpringSim (HPC), page 1. ACM, (2013)Swift machine learning model serving scheduling: a region based reinforcement learning approach., , , , , and . SC, page 13:1-13:23. ACM, (2019)A flexible QoS fortified distributed key-value storage system for the cloud., , , , , , and . IEEE BigData, page 515-522. IEEE Computer Society, (2015)Optimistic Sampling Strategy for Data-Efficient Reinforcement Learning., , , , and . IEEE Access, (2019)Toward Efficient Homomorphic Encryption for Outsourced Databases through Parallel Caching., , , and . Proc. ACM Manag. Data, 1 (1): 66:1-66:23 (2023)UCM-Net: A Lightweight and Efficient Solution for Skin Lesion Segmentation using MLP and CNN., , and . CoRR, (2023)Towards high-performance and cost-effective distributed storage systems with information dispersal algorithms., , , , and . CLUSTER, page 1-5. IEEE Computer Society, (2013)Data-Efficient Reinforcement Learning Using Active Exploration Method., , , , and . ICONIP (3), volume 11303 of Lecture Notes in Computer Science, page 265-276. Springer, (2018)