From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Evaluation of Checkpoint Recovery for Massively Multiplayer Online Games, , , , , , и . PVLDB, 2 (1): 1258--1269 (2009)Blotter: Low Latency Transactions for Geo-Replicated Storage., , , , , и . WWW, стр. 263-272. ACM, (2017)Hashtag Recommendation for Enterprise Applications., , , , , , и . CIKM, стр. 893-902. ACM, (2016)Towards Expressive Publish/Subscribe Systems., , , , и . EDBT, том 3896 из Lecture Notes in Computer Science, стр. 627-644. Springer, (2006)What is "next" in event processing?, , , и . PODS, стр. 263-272. ACM, (2007)Database research opportunities in computer games., , , , и . SIGMOD Record, 36 (3): 7-13 (2007)The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis., , , , , , , и . SIGMOD Conference, стр. 1311-1326. ACM, (2015)Fine-grained disclosure control for app ecosystems., , , и . SIGMOD Conference, стр. 869-880. ACM, (2013)DualMiner: a dual-pruning algorithm for itemsets with constraints., , , и . KDD, стр. 42-51. ACM, (2002)Beyond myopic inference in big data pipelines., , , и . KDD, стр. 86-94. ACM, (2013)