Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Please mind the gap between intra- and inter-chassis parallelism! (and how it can be closed)., , and . Tiny Trans. Comput. Sci., (2012)Weld: Rethinking the Interface Between Data-Intensive Applications., , , , , , , , , and . CoRR, (2017)The Seven Deadly Sins of Cloud Computing Research., , and . HotCloud, USENIX Association, (2012)Position: GDPR Compliance by Construction., , , and . Poly/DMAH@VLDB, volume 11721 of Lecture Notes in Computer Science, page 39-53. Springer, (2019)Nu: Achieving Microsecond-Scale Resource Fungibility with Logical Processes., , , , and . NSDI, page 1409-1427. USENIX Association, (2023)Firmament: Fast, Centralized Cluster Scheduling at Scale., , , , and . OSDI, page 99-115. USENIX Association, (2016)Variance Reduction for Reinforcement Learning in Input-Driven Environments., , , and . ICLR (Poster), OpenReview.net, (2019)Cluster Scheduling for Data Centers.. ACM Queue, 15 (5): 70 (2017)Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion).. Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 60-70. Springer, (2010)DEMO: Integrating MPC in Big Data Workflows., , , , and . ACM Conference on Computer and Communications Security, page 1844-1846. ACM, (2016)