Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training Classifiers with Natural Language Explanations., , , , , and . ACL (1), page 1884-1895. Association for Computational Linguistics, (2018)Lower Quantity, Higher Quality: Auditing News Content and User Perceptions on Twitter/X Algorithmic versus Chronological Timelines., , , and . CoRR, (2024)Exoshuffle: An Extensible Shuffle Architecture., , , , , , , , , and . SIGCOMM, page 564-577. ACM, (2023)Towards a Distributed OS for Data-Intensive Cloud Applications. University of California, Berkeley, USA, (2023)Verifying a high-performance crash-safe file system using a tree specification., , , , , , , and . SOSP, page 270-286. ACM, (2017)Computing minimal surfaces with differential forms., and . ACM Trans. Graph., 40 (4): 113:1-113:14 (2021)The power of foregone payoffs: a mousetracking study., , , and . BQGT, page 59:1. ACM, (2010)Hoplite: efficient and fault-tolerant collective communication for task-based distributed systems., , , , , , , and . SIGCOMM, page 641-656. ACM, (2021)Practical Volume-Based Attacks on Encrypted Databases., , , and . IACR Cryptology ePrint Archive, (2019)AI-augmented failure modes, effects, and criticality analysis (AI-FMECA) for industrial applications., , , , , and . Reliab. Eng. Syst. Saf., (2024)