Author of the publication

A High-Performance Spatial Storage Based on Main-Memory Database Architecture.

, , , , , and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 1066-1075. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16Gb 1.2V 3.2Gb/s/pin DDR4 SDRAM with improved power distribution and repair strategy., , , , , , , , , and 15 other author(s). ISSCC, page 212-214. IEEE, (2018)Four-bar linkage-based tool changing mechanism and torque compensation based on dynamic characteristics., , , and . URAI, page 326-327. IEEE, (2016)Tree-based modeling of prosodic phrasing and segmental duration for Korean TTS systems., and . Speech Commun., 28 (4): 283-300 (1999)I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata., , and . WWW, page 1191-1200. International World Wide Web Conferences Steering Committee / ACM, (2013)Route Optimization with Additional Destination-Information in Mobile Networks., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 286-295. Springer, (2007)Two Alternative Registration and Paging Schemes for Supporting Idle Mode in IEEE 802.16e Wireless MAN., , , , and . VTC Fall, page 1-5. IEEE, (2006)WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream., and . IEEE Trans. Dependable Secur. Comput., 10 (3): 183-195 (2013)Robust OFDM-Based Synchronization Against Very High Fractional CFO and Time-Varying Fading., and . IEEE Syst. J., 14 (3): 4047-4058 (2020)Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis., , and . CCS, page 1994-2008. ACM, (2023)Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking., , , , , , , and . USENIX Security Symposium, page 1705-1722. USENIX Association, (2018)