Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The hiring problem and Lake Wobegon strategies., , , , , and . SODA, page 1184-1193. SIAM, (2008)Distance-Sensitive Bloom Filters., and . ALENEX, page 41-50. SIAM, (2006)Simple summaries for hashing with choices, and . IEEE/ACM Trans. Netw., 16 (1): 218--231 (2008)More Robust Hashing: Cuckoo Hashing with a Stash., , and . ESA, volume 5193 of Lecture Notes in Computer Science, page 611-622. Springer, (2008)Stability and Efficiency of a Random Local Load Balancing Protocol., , and . FOCS, page 472-481. IEEE Computer Society, (2003)Hash-Based Techniques for High-Speed Packet Processing., , and . Algorithms for Next Generation Networks, Springer, (2010)Directly Lower Bounding the Information Capacity for Channels with I.I.D. Deletions and Duplications., and . ISIT, page 1731-1735. IEEE, (2007)Load Balancing in Arbitrary Network Topologies with Stochastic Adversarial Input., , and . SIAM J. Comput., 34 (3): 616-639 (2005)An efficient rigorous approach for identifying statistically significant frequent itemsets., , , , , and . PODS, page 117-126. ACM, (2009)The Power of One Move: Hashing Schemes for Hardware., and . INFOCOM, page 106-110. IEEE, (2008)