Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully distributed robust singular value decomposition., , , and . P2P, page 1-9. IEEE, (2014)Spanning Tree or Gossip for Aggregation: A Comparative Study., and . Euro-Par, volume 8632 of Lecture Notes in Computer Science, page 379-390. Springer, (2014)Gossip-based distributed stochastic bandit algorithms., , , , , and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 19-27. JMLR.org, (2013)A scalable and robust framework for distributed applications., , and . IEEE Congress on Evolutionary Computation, page 1540-1545. IEEE, (2002)Anonymous, Fault-Tolerant Distributed Queries for Smart Devices., , , and . ACM Trans. Cyber Phys. Syst., 3 (2): 16:1-16:29 (2019)Distributional differential privacy for large-scale smart metering., and . IH&MMSec, page 141-146. ACM, (2014)Adversarial Robustness of Model Sets., , and . IJCNN, page 1-8. IEEE, (2020)Token Account Algorithms: The Best of the Proactive and Reactive Worlds., and . ICDCS, page 885-895. IEEE Computer Society, (2018)Modeling Unconnectable Peers in Private BitTorrent Communities., , , and . PDP, page 582-589. IEEE Computer Society, (2011)Decentralized Management of Random Walks over a Mobile Phone Network., and . PDP, page 100-107. IEEE Computer Society, (2017)