Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Cross Search via Submodular Optimization., , , , and . ESA, volume 204 of LIPIcs, page 31:1-31:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Finding Large Matchings in Semi-Streaming., , and . ICDM Workshops, page 608-614. IEEE Computer Society, (2016)Optimal Communication Bounds for Classic Functions in the Coordinator Model and Beyond., , , , and . STOC, page 1911-1922. ACM, (2024)Massively Parallel Computation via Remote Memory Access., , , , , and . SPAA, page 59-68. ACM, (2019)Prophets, Secretaries, and Maximizing the Probability of Choosing the Best., , , and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 3717-3727. PMLR, (2020)Robust Load Balancing with Machine Learned Advice., , , and . SODA, page 20-34. SIAM, (2022)Online Pandora's Boxes and Bandits., , , and . AAAI, page 1885-1892. AAAI Press, (2019)Almost Linear Time Density Level Set Estimation via DBSCAN., , and . AAAI, page 7349-7357. AAAI Press, (2021)Locality-Sensitive Hashing for f-Divergences: Mutual Information Loss and Beyond., , , and . NeurIPS, page 10044-10054. (2019)Replicable Bandits., , , , , and . ICLR, OpenReview.net, (2023)