Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing fuzzy rough approximations in large scale information systems., , , , , , , and . IEEE BigData, page 9-16. IEEE Computer Society, (2014)Tracking hazardous aerial plumes using IoT-enabled drone swarms., , , and . WF-IoT, page 377-382. IEEE, (2018)Evaluating the impact of pushing voice-driven interaction pipelines to the edge., and . CF, page 45-53. ACM, (2018)Memory MISER: Improving Main Memory Energy Efficiency in Servers., , and . IEEE Trans. Computers, 58 (3): 336-350 (2009)The Optimist, the Pessimist, and the Global Race to Exascale in 20 Megawatts., and . Computer, 45 (1): 95-97 (2012)HcBench: Methodology, development, and characterization of a customer usage representative big data/Hadoop benchmark., , , and . IISWC, page 77-86. IEEE Computer Society, (2013)Identifying parking spaces & detecting occupancy using vision-based IoT devices., , , , and . GIoTS, page 1-6. IEEE, (2017)Memory-miser: a performance-constrained runtime system for power-scalable clusters., , and . Conf. Computing Frontiers, page 237-246. ACM, (2007)Evaluating Voice Interaction Pipelines at the Edge., and . EDGE, page 248-251. IEEE Computer Society, (2017)Namatad: Inferring occupancy from building sensors using machine learning., , , , , , , and . WF-IoT, page 478-483. IEEE Computer Society, (2016)