Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hollow Heaps., , , and . ICALP (1), volume 9134 of Lecture Notes in Computer Science, page 689-700. Springer, (2015)Privately Learning Thresholds: Closing the Exponential Gap., , , , and . COLT, volume 125 of Proceedings of Machine Learning Research, page 2263-2285. PMLR, (2020)A kinetic triangulation scheme for moving points in the plane., , and . Comput. Geom., 44 (4): 191-205 (2011)On Differentially Private Online Predictions., , , , and . CoRR, (2023)On the Interplay between Incentive Compatibility and Envy Freeness, , , , and . CoRR, (2010)Truth and Envy in Capacitated Allocation Games, , , , and . CoRR, (2010)Leveraging discarded samples for tighter estimation of multiple-set aggregates., and . SIGMETRICS/Performance, page 251-262. ACM, (2009)Minimal Total Deviation in TCAM Load Balancing., , and . INFOCOM, page 450-459. IEEE, (2022)What You Can Do with Coordinated Samples., and . APPROX-RANDOM, volume 8096 of Lecture Notes in Computer Science, page 452-467. Springer, (2013)Separating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage Model., , , and . CRYPTO (3), volume 12827 of Lecture Notes in Computer Science, page 94-121. Springer, (2021)