Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight Bounds for Adversarially Robust Streams and Sliding Windows via Difference Estimators., and . CoRR, (2020)Memory-Efficient Performance Monitoring on Programmable Switches with Lean Algorithms., , , , and . APOCS, page 31-44. SIAM, (2020)Learning-Augmented Algorithms for Online Linear and Semidefinite Programming., , , , and . NeurIPS, (2022)Provable Data Subset Selection For Efficient Neural Networks Training., , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 34533-34555. PMLR, (2023)Bandwidth-Hard Functions: Reductions and Lower Bounds., , and . CCS, page 1820-1836. ACM, (2018)On the Economics of Offline Password Cracking., , and . IEEE Symposium on Security and Privacy, page 853-871. IEEE Computer Society, (2018)Efficient Coreset Constructions via Sensitivity Sampling., , , , and . ACML, volume 157 of Proceedings of Machine Learning Research, page 948-963. PMLR, (2021)Robust Algorithms on Adaptive Inputs from Bounded Adversaries., , , , , and . ICLR, OpenReview.net, (2023)Streaming Algorithms with Few State Changes., , and . Proc. ACM Manag. Data, 2 (2): 82 (2024)Approximating Cumulative Pebbling Cost Is Unique Games Hard., , and . ITCS, volume 151 of LIPIcs, page 13:1-13:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)