Author of the publication

Using simulation to explore distributed key-value stores for extreme-scale system services.

, , , , and . SC, page 9:1-9:12. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the On-Line Weighted k-Taxi Problem., and . ESCAPE, volume 4614 of Lecture Notes in Computer Science, page 152-162. Springer, (2007)Incremental Database Design Revisited., and . ICCI, volume 497 of Lecture Notes in Computer Science, page 219-230. Springer, (1991)Mining Customer Value: From Association Rules to Direct Marketing., , , and . Data Min. Knowl. Discov., 11 (1): 57-79 (2005)An adaptive traffic MAC protocol based on correlation of nodes., and . EURASIP J. Wireless Comm. and Networking, (2015)A Com-Gis Based Decision Tree Model Inagricultural Application., , and . CCTA (1), volume 293 of IFIP Advances in Information and Communication Technology, page 455-464. Springer, (2008)Mobile Robot Simultaneous Localization and Mapping Based on a Monocular Camera., , and . J. Robotics, (2016)Learning Scalable and Precise Representation of Program Semantics.. CoRR, (2019)Profit Mining: From Patterns to Actions., , and . EDBT, volume 2287 of Lecture Notes in Computer Science, page 70-87. Springer, (2002)Some Positive Results for Boundedness of Multiple Recursive Rules.. ICDT, volume 893 of Lecture Notes in Computer Science, page 383-396. Springer, (1995)Computing Join Aggregates over Private Tables., , , and . DaWaK, volume 4654 of Lecture Notes in Computer Science, page 78-88. Springer, (2007)