Author of the publication

NeuGraph: Parallel Deep Neural Network Computation on Large Graphs.

, , , , , , and . USENIX Annual Technical Conference, page 443-458. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions., , , , and . ICASSP, page 3477-3480. IEEE, (2009)Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator., , , and . J. Comput. Sci. Technol., 24 (5): 855-867 (2009)DSwitch: a dual mode direct and network attached disk., , and . SoCC, page 71-83. ACM, (2015)Understanding and Surpassing Dropbox: Efficient Incremental Synchronization in Cloud Storage Services., , , and . GLOBECOM, page 1-7. IEEE, (2015)Understanding the Gift-Sending Interaction on Live-Streaming Video Websites., , and . HCI (12), volume 10282 of Lecture Notes in Computer Science, page 274-285. Springer, (2017)Processing Concurrent Graph Analytics with Decoupled Computation Model., , , and . IEEE Trans. Computers, 66 (5): 876-890 (2017)Understanding Sybil Groups in the Wild., , , , and . J. Comput. Sci. Technol., 30 (6): 1344-1357 (2015)Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage., , , , and . IEEE Trans. Parallel Distributed Syst., 22 (9): 1514-1527 (2011)Understanding the performance of offline download in real p2p networks., , , , and . Peer-to-Peer Netw. Appl., 8 (6): 992-1007 (2015)VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils., , , , and . IEEE Trans. Dependable Secur. Comput., 13 (4): 488-501 (2016)