Author of the publication

Exploiting Single-Threaded Model in Multi-Core In-Memory Systems.

, , , , , , and . IEEE Trans. Knowl. Data Eng., 28 (10): 2635-2650 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sense the physical, walkthrough the virtual, manage the co (existing) spaces: a database perspective., , and . SIGMOD Rec., 38 (3): 5-10 (2009)Exploiting Single-Threaded Model in Multi-Core In-Memory Systems., , , , , , and . IEEE Trans. Knowl. Data Eng., 28 (10): 2635-2650 (2016)Anytime Neural Architecture Search on Tabular Data., , , , and . CoRR, (2024)GlassDB: Practical Verifiable Ledger Database Through Transparency., , , , , , and . CoRR, (2022)DUET: A Tuning-Free Device-Cloud Collaborative Parameters Generation Framework for Efficient Device Model Generalization., , , , , , , , , and 1 other author(s). WWW, page 3077-3085. ACM, (2023)Building CyberBroker in Digital Marketplaces Using Java and CORBA., , and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 1086-1095. Springer, (1999)Frequent Update and Efficient Retrieval: an Oxymoron on Moving Object Indexes?, , and . WISE Workshops, page 3-12. IEEE Computer Society, (2002)Continuous Skyline Queries for Moving Objects., , , and . IEEE Trans. Knowl. Data Eng., 18 (12): 1645-1658 (2006)Selective Hashing: Closing the Gap between Radius Search and k-NN Search., , , and . KDD, page 349-358. ACM, (2015)Characterizing Cryptocurrency-themed Malicious Browser Extensions., , , , , , , and . SIGMETRICS (Abstracts), page 91-92. ACM, (2023)