Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms., , and . SIAM J. Comput., 18 (3): 499-532 (1989)Generalized Sweep Methods for Parallel Computational Geometry., , and . SPAA, page 280-289. ACM, (1990)Privacy-preserving data-oblivious geometric algorithms for geographic data., , and . GIS, page 13-22. ACM, (2010)Straggler Identification in Round-Trip Data Streams via Newton's Identities and Invertible Bloom Filters., and . IEEE Trans. Knowl. Data Eng., 23 (2): 297-306 (2011)Achieving Communication Efficiency through Push-Pull Partitioning of Semantic Spaces to Disseminate Dynamic Information., , , , and . IEEE Trans. Knowl. Data Eng., 18 (10): 1352-1367 (2006)Balanced Aspect Ratio Trees: Combining the Advantages of k-d Trees and Octrees., , and . SODA, page 300-309. ACM/SIAM, (1999)Quadratic Time Algorithms Appear to be Optimal for Sorting Evolving Data., , , , and . CoRR, (2018)Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems, , and . CoRR, (2009)Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation, , , and . CoRR, (2011)Guard Placement For Wireless Localization, , and . CoRR, (2006)