Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gesprengte Ketten. Informatik-Spektrum, 38 (1): 10--15 (February 2015)Big Data, , , , , , and . Business & Information Systems Engineering, 6 (5): 261-266 (October 2014)Progressive Optimization in Action., , , , and . VLDB, page 1337-1340. Morgan Kaufmann, (2004)Semantification of Identifiers in Mathematics for Better Math Information Retrieval., , , , , , , and . SIGIR, page 135-144. ACM, (2016)A survey on transactional stream processing., , and . VLDB J., 33 (2): 451-479 (2024)Workload Prediction for IoT Data Management Systems., , , , and . BTW, volume P-331 of LNI, page 943-950. Gesellschaft für Informatik e.V., (2023)Fast CSV Loading Using GPUs and RDMA for In-Memory Data Processing., , and . BTW, volume P-311 of LNI, page 19-38. Gesellschaft für Informatik, Bonn, (2021)Peeking into the optimization of data flow programs with MapReduce-style UDFs., , , , , , and . ICDE, page 1292-1295. IEEE Computer Society, (2013)I2: Interactive Real-Time Visualization for Streaming Data., , , , and . EDBT, page 526-529. OpenProceedings.org, (2017)Governor: Operator Placement for a Unified Fog-Cloud Environment., , and . EDBT, page 631-634. OpenProceedings.org, (2020)