Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evaluation of Checkpoint Recovery for Massively Multiplayer Online Games, , , , , , and . PVLDB, 2 (1): 1258--1269 (2009)Overview of the 2003 KDD Cup, , and . SIGKDD Explor. Newsl., 5 (2): 149--151 (December 2003)Balancing Isolation and Sharing of Data in Third-Party Extensible App Ecosystems., , and . ICWE, volume 9114 of Lecture Notes in Computer Science, page 713-716. Springer, (2015)An Empirical Analysis of Deep Learning for Cardinality Estimation., , , and . CoRR, (2019)Sparks of Artificial General Intelligence: Early experiments with GPT-4, , , , , , , , , and 4 other author(s). PDF, (March 2023)cite arxiv:2303.12712.Blotter: Low Latency Transactions for Geo-Replicated Storage., , , , , and . WWW, page 263-272. ACM, (2017)Hashtag Recommendation for Enterprise Applications., , , , , , and . CIKM, page 893-902. ACM, (2016)The Beckman Report on Database Research, , , , , , , , , and 21 other author(s). Communications of the ACM, 59 (2): 92--99 (February 2016)Differential Privacy via Wavelet Transforms, , and . CoRR, (2009)The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis., , , , , , , and . SIGMOD Conference, page 1311-1326. ACM, (2015)