Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large Scale Estimation in Cyberphysical Systems using Streaming Data: a Case Study with Smartphone Traces, , , , and . CoRR, (2012)Optimizing Cache Performance for Graph Analytics., , , , and . CoRR, (2016)Big Data Platforms for Data Analytics., , , , and . Encyclopedia of Database Systems (2nd ed.), Springer, (2018)ColBERTv2: Effective and Efficient Retrieval via Lightweight Late Interaction., , , , and . NAACL-HLT, page 3715-3734. Association for Computational Linguistics, (2022)Multi-resource fair queueing for packet processing., , , and . SIGCOMM, page 1-12. ACM, (2012)Approximate Selection with Guarantees using Proxies., , , , and . Proc. VLDB Endow., 13 (11): 1990-2003 (2020)Weld: Rethinking the Interface Between Data-Intensive Applications., , , , , , , , , and . CoRR, (2017)Did the Model Change? Efficiently Assessing Machine Learning API Shifts., , , and . CoRR, (2021)Are More LLM Calls All You Need? Towards Scaling Laws of Compound Inference Systems., , , , , , and . CoRR, (2024)Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks., , , , , and . CoRR, (2023)