Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast top-k similarity queries via matrix compression., and . CIKM, page 2070-2074. ACM, (2012)Fast Image Tagging., , and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 1274-1282. JMLR.org, (2013)Diagnosing Performance Changes by Comparing Request Flows., , , , , , , , and . NSDI, USENIX Association, (2011)Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs., , and . SOSP, page 305-320. ACM, (2009)A survey of statistical network models, , , and . (2009)cite arxiv:0912.5410Comment: 96 pages, 14 figures, 333 references.Modeling the relative fitness of storage., , , , and . SIGMETRICS, page 37-48. ACM, (2007)Lazy Paired Hyper-Parameter Tuning., and . IJCAI, page 1924-1931. IJCAI/AAAI, (2013)Failure Diagnosis Using Decision Trees., , , , and . ICAC, page 36-43. IEEE Computer Society, (2004)Efficient Test Selection in Active Diagnosis via Entropy Approximation., , and . UAI, page 675-. AUAI Press, (2005)Practical Performance Models for Complex, Popular Applications, , , and . Performance Evaluation Review, page 1--12. (June 2010)