Author of the publication

Breaking the boundary for whole-system performance optimization of big data.

, , , , , , , and . ISLPED, page 126-131. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating design quality of digital systems via machine learning., , , and . ICECS, page 623-626. IEEE, (2010)Estimating Ad Clickthrough Rate through Query Intent Analysis., , , and . Web Intelligence, page 222-229. IEEE Computer Society, (2009)On-the-Fly Reduction of Stimuli for Functional Verification., , , , and . Asian Test Symposium, page 448-454. IEEE Computer Society, (2010)Availability-Constrained Shared Backup Path Protection (SBPP) for GMPLS-Based Spare Capacity Reprovisioning., , , and . ICC, page 2186-2191. IEEE, (2007)The role mining problem: A formal perspective., , and . ACM Trans. Inf. Syst. Secur., 13 (3): 27:1-27:31 (2010)Finding Diverse Neighbors in High Dimensional Space., , , and . ICDE, page 905-916. IEEE Computer Society, (2018)Towards Deep and Representation Learning for Talent Search at LinkedIn., , , , , , , , and . CIKM, page 2253-2261. ACM, (2018)Tracklet Siamese Network with Constrained Clustering for Multiple Object Tracking., , , , , , and . VCIP, page 1-4. IEEE, (2018)SESQ: A Model-Driven Method for Building Object Level Vertical Search Engines., , , , , , and . ER, volume 5231 of Lecture Notes in Computer Science, page 516-517. Springer, (2008)Search Result Prefetching on Desktop and Mobile., , and . ACM Trans. Inf. Syst., 35 (3): 23:1-23:34 (2017)