Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PDSEC-19 Keynote.. IPDPS Workshops, page 675. IEEE, (2019)Off-line admission control for general scheduling problems., , and . SODA, page 879-888. ACM/SIAM, (2000)Constructing Evolutionary Trees in the Presence of Polymorphic Characters., , , and . SIAM J. Comput., 29 (1): 103-131 (1999)Communication-Aware Processor Allocation for Supercomputers: Finding Point Sets of Small Average Distance., , , , , , and . Algorithmica, 50 (2): 279-298 (2008)Communication-Aware Processor Allocation for Supercomputers., , , , , , and . WADS, volume 3608 of Lecture Notes in Computer Science, page 169-181. Springer, (2005)Geometric Hitting Set for Segments of Few Orientations, , , , and . Theory Comput. Syst., 62 (2): 268--303 (2018)Why Do Simple Algorithms for Triangle Enumeration Work in the Real World?, , , , , and . Internet Math., 11 (6): 555-571 (2015)How to Manage High-Bandwidth Memory Automatically., , , , , and . SPAA, page 187-199. ACM, (2020)Enabling Onboard Detection of Events of Scientific Interest for the Europa Clipper Spacecraft., , , , , , , and . KDD, page 2191-2201. ACM, (2019)Using advanced data structures to enable responsive security monitoring., , , , , , , , and . Clust. Comput., 25 (4): 2893-2914 (2022)