Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Tomorrow's Government: An Exploratory Case Study of Resistance to Data Consolidation., , and . AMCIS, page 146. Association for Information Systems, (2004)Edgecomputing: extending enterprise applications to the edge of the internet., , and . WWW (Alternate Track Papers & Posters), page 180-187. ACM, (2004)A Study of Multi-Factor and Risk-Based Authentication Availability., , , , , , and . USENIX Security Symposium, page 2043-2060. USENIX Association, (2023)Outrageously Large Neural Networks: The Sparsely-Gated Mixture-of-Experts Layer., , , , , , and . ICLR (Poster), OpenReview.net, (2017)Cyber security in New Space., , , , and . Int. J. Inf. Sec., 20 (3): 287-311 (2021)TensorFlow: A System for Large-Scale Machine Learning., , , , , , , , , and 1 other author(s). OSDI, 16, page 265--283. (2016)TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems, , , , , , , , , and 30 other author(s). (2015)Software available from tensorflow.org.MLIR: Scaling Compiler Infrastructure for Domain Specific Computation., , , , , , , , , and . CGO, page 2-14. IEEE, (2021)The Fun and Future of CTF., , , , and . 3GSE, USENIX Association, (2014)TPU-KNN: K Nearest Neighbor Search at Peak FLOP/s., , , , , and . NeurIPS, (2022)