Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-optimal Algorithms for Generalized Dominance Computation and Related Problems on Mesh Connected Computers and Meshes with Multiple Broadcasting.. Parallel Algorithms Appl., 8 (3-4): 271-283 (1996)Host Mobility Using an Internet Indirection Infrastructure., , , , and . Wireless Networks, 11 (6): 741-756 (2005)CloudPolice: taking access control out of the network., , , , and . HotNets, page 7. ACM, (2010)ODR: output-deterministic replay for multicore debugging., and . SOSP, page 193-206. ACM, (2009)COPS: Quality of Service vs. Any Service at All., , , , and . IWQoS, volume 3552 of Lecture Notes in Computer Science, page 3-15. Springer, (2005)Population Based Augmentation: Efficient Learning of Augmentation Policy Schedules., , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 2731-2741. PMLR, (2019)Mammoths Are Slow: The Overlooked Transactions of Graph Data., , , , and . Proc. VLDB Endow., 17 (4): 904-911 (December 2023)SoK: A Generalized Multi-Leader State Machine Replication Tutorial., , , , and . J. Syst. Res., (September 2021)A cost comparison of datacenter network architectures., , , , and . CoNEXT, page 16. ACM, (2010)Macroscope: end-point approach to networked application dependency discovery., , , , and . CoNEXT, page 229-240. ACM, (2009)