Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounded Concurrent Time-Stamp Systems Are Constructible, and . STOC, page 454-466. ACM, (1989)Learning to Correct Sloppy Annotations in Electron Microscopy Volumes., , , , , and . CVPR Workshops, page 4273-4284. IEEE, (2023)Cross-Classification Clustering: An Efficient Multi-Object Tracking Technique for 3-D Instance Segmentation in Connectomics., , , , , and . CVPR, page 8425-8435. Computer Vision Foundation / IEEE, (2019)HDMapGen: A Hierarchical Graph Generative Model of High Definition Maps., , , , , , , , , and . CVPR, page 4227-4236. Computer Vision Foundation / IEEE, (2021)Efficient Lock Free Privatization., , , and . OPODIS, volume 6490 of Lecture Notes in Computer Science, page 333-347. Springer, (2010)Sparsity in Deep Neural Nets (Keynote).. PPoPP, page 1. ACM, (2024)NUMA-aware reader-writer locks., , , , , and . PPoPP, page 157-166. ACM, (2013)Concurrent Priority Queue Algorithms., and . WDAS, volume 6 of Proceedings in Informatics, page 107-132. Carleton Scientific, (1999)Flat-combining NUMA locks., , and . SPAA, page 65-74. ACM, (2011)A Steady State Analysis of Diffracting Trees (Extended Abstract)., , and . SPAA, page 33-41. ACM, (1996)