Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why Do Simple Algorithms for Triangle Enumeration Work in the Real World?, , , , , and . Internet Math., 11 (6): 555-571 (2015)Geometric Hitting Set for Segments of Few Orientations, , , , and . Theory Comput. Syst., 62 (2): 268--303 (2018)PDSEC-19 Keynote.. IPDPS Workshops, page 675. IEEE, (2019)How to Manage High-Bandwidth Memory Automatically., , , , , and . SPAA, page 187-199. ACM, (2020)Constructing Evolutionary Trees in the Presence of Polymorphic Characters., , , and . SIAM J. Comput., 29 (1): 103-131 (1999)Communication-Aware Processor Allocation for Supercomputers., , , , , , and . WADS, volume 3608 of Lecture Notes in Computer Science, page 169-181. Springer, (2005)Off-line admission control for general scheduling problems., , and . SODA, page 879-888. ACM/SIAM, (2000)Communication-Aware Processor Allocation for Supercomputers: Finding Point Sets of Small Average Distance., , , , , , and . Algorithmica, 50 (2): 279-298 (2008)Enabling Onboard Detection of Events of Scientific Interest for the Europa Clipper Spacecraft., , , , , , , and . KDD, page 2191-2201. ACM, (2019)The Network Inhibition Problem. Proceedings of the Twenty-fifth Annual ACM Symposium on Theory of Computing, page 776--785. New York, NY, USA, ACM, (1993)