Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate Selection with Guarantees using Proxies., , , , and . Proc. VLDB Endow., 13 (11): 1990-2003 (2020)Are More LLM Calls All You Need? Towards Scaling Laws of Compound Inference Systems., , , , , , and . CoRR, (2024)Weld: Rethinking the Interface Between Data-Intensive Applications., , , , , , , , , and . CoRR, (2017)Proof: Accelerating Approximate Aggregation Queries with Expensive Predicates., , , , , and . CoRR, (2021)Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks., , , , , and . CoRR, (2023)Did the Model Change? Efficiently Assessing Machine Learning API Shifts., , , and . CoRR, (2021)VIVA: An End-to-End System for Interactive Video Analytics., , , , and . CIDR, www.cidrdb.org, (2022)Similarity Search for Efficient Active Learning and Search of Rare Concepts., , , , , , , , , and . AAAI, page 6402-6410. AAAI Press, (2022)Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking., , , , , , , , , and 1 other author(s). SOSP, page 200-215. ACM, (2023)Don't Hate the Player, Hate the Game: Safety and Utility in Multi-Agent Congestion Control., , and . HotNets, page 140-146. ACM, (2021)