Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Tree Layout in a Multilevel Memory Hierarchy, , , , , , and . CoRR, (2002)Don't Thrash: How to Cache Your Hash on Flash., , , , , , , , , and . Proc. VLDB Endow., 5 (11): 1627-1637 (2012)File Systems Fated for Senescence? Nonsense, Says Science!, , , , , , , , , and 1 other author(s). FAST, page 45-58. USENIX Association, (2017)Insertion Sort is O(n log n), , and . Theor. Comp. Sys., 39 (3): 391--397 (2006)COFE: A Scalable Method for Feature Extraction from Complex Objects., and . DaWaK, volume 1874 of Lecture Notes in Computer Science, page 358-371. Springer, (2000)Adversarial Analyses of Window Backoff Strategies., , , , and . IPDPS Next Generation Software Program - NSFNGS - PI Workshop, IEEE Computer Society, (2004)GPU LSM: A Dynamic Dictionary Data Structure for the GPU., , , , and . IPDPS, page 430-440. IEEE Computer Society, (2018)A Dynamic Hash Table for the GPU., , and . IPDPS, page 419-429. IEEE Computer Society, (2018)Modern Hashing Made Simple., , , and . SOSA, page 363-373. SIAM, (2024)Lower Bounds for Clear Transmissions in Radio Networks., , and . LATIN, volume 3887 of Lecture Notes in Computer Science, page 447-454. Springer, (2006)