Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SST: Synchronized Spatial-Temporal Trajectory Similarity Search., , , , and . GeoInformatica, 24 (4): 777-800 (2020)RDMAbox : Optimizing RDMA for Memory Intensive Workloads., , , , and . CoRR, (2021)Octopus: Hybrid Big Data Integration Engine., , , , and . CloudCom, page 462-466. IEEE Computer Society, (2015)CLEAN: Frequent Pattern-Based Trajectory Spatial-Temporal Compression on Road Networks., , , , , and . MDM, page 605-610. IEEE, (2019)Towards Enabling Trusted Artificial Intelligence via Blockchain., , , , , , and . PADG@ESORICS, volume 11550 of Lecture Notes in Computer Science, page 137-153. Springer, (2018)zBalancer: a Dual-Function CPU Load Balancer for NUMA Architectures., , and . PDCCS, page 103-110. ISCA, (2008)StackVault: Protection from Untrusted Functions., , , , , and . TPS-ISA, page 294-306. IEEE, (2020)The Design and Implementation of Zap: A System for Migrating Computing Environments., , , and . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.A highly available transaction processing system with non-disruptive failure handling., and . NOMS, page 409-416. IEEE, (2012)StackVault: Protection from Untrusted Functions., , , , , and . CoRR, (2019)