Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LIT: Learned Intermediate Representation Training for Model Compression., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 3509-3518. PMLR, (2019)Efficient Point Rendering Method Using Sequential Level-of-Detail., and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 1127-1133. Springer, (2005)Identifying and Mitigating the Security Risks of Generative AI., , , , , , , , , and 13 other author(s). Found. Trends Priv. Secur., 6 (1): 1-52 (2023)Accelerating Approximate Aggregation Queries with Expensive Predicates., , , , , and . Proc. VLDB Endow., 14 (11): 2341-2354 (2021)Optimizing Video Analytics with Declarative Model Relationships., , , , , and . Proc. VLDB Endow., 16 (3): 447-460 (2022)Analysis of DAWNBench, a Time-to-Accuracy Machine Learning Performance Benchmark., , , , , , , , , and . ACM SIGOPS Oper. Syst. Rev., 53 (1): 14-25 (2019)Accelerating Queries over Unstructured Data with ML.. CIDR, www.cidrdb.org, (2021)Willump: A Statistically-Aware End-to-end Optimizer for Machine Learning Inference., , , , , and . CoRR, (2019)Approximate Selection with Guarantees using Proxies., , , , and . Proc. VLDB Endow., 13 (11): 1990-2003 (2020)Task-agnostic Indexes for Deep Learning-based Queries over Unstructured Data., , , , and . CoRR, (2020)