Author of the publication

Scal: A Benchmarking Suite for Concurrent Data Structures.

, , , , , and . NETYS, volume 9466 of Lecture Notes in Computer Science, page 1-14. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeSignate: detecting signature characters in gene sequence alignments for taxon diagnoses., , , , , and . BMC Bioinform., 21 (1): 151 (2020)Benchmarking the Utility of w-event Differential Privacy Mechanisms - When Baselines Become Mighty Competitors., , and . Proc. VLDB Endow., 16 (8): 1830-1842 (2023)ACDC-JS: explorative benchmarking of javascript memory management., , , , , and . DLS, page 67-78. ACM, (2014)JEDI: These aren't the JSON documents you're looking for?, , , , and . SIGMOD Conference, page 1584-1597. ACM, (2022)Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption., , , and . IEEE Trans. Inf. Forensics Secur., 13 (9): 2137-2150 (2018)A Link is not Enough - Reproducibility of Data., , , , and . Datenbank-Spektrum, 19 (2): 107-115 (2019)JEDI: These aren't the JSON documents you're looking for... (Extended Version*)., , , , and . CoRR, (2022)FINEX: A Fast Index for Exact & Flexible Density-Based Clustering., , , , , and . Proc. ACM Manag. Data, 1 (1): 71:1-71:25 (2023)Weaknesses in Security Considerations Related to Chaos-Based Image Encryption., , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 278-291. Springer, (2016)Effective Filters and Linear Time Verification for Tree Similarity Joins., , , and . ICDE, page 854-865. IEEE, (2019)