Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random walks which prefer unvisited edges: Exploring high girth even degree expanders in linear time., , and . Random Struct. Algorithms, 46 (1): 36-54 (2015)The Natural Work-Stealing Algorithm is Stable., , and . SIAM J. Comput., 32 (5): 1260-1279 (2003)Distributed Selfish Load Balancing., , , , , and . SIAM J. Comput., 37 (4): 1163-1181 (2007)Randomized diffusion for indivisible loads., , , , and . J. Comput. Syst. Sci., 81 (1): 159-185 (2015)A proportionate fair scheduling rule with good worst-case performance., , , , , and . SPAA, page 101-108. ACM, (2003)Distributing Storage in Cloud Environments., , , , and . IPDPS Workshops, page 963-973. IEEE, (2013)On the Stability of Dynamic Diffusion Load Balancing., , and . Algorithmica, 50 (3): 329-350 (2008)A new analytical method for parallel, diffusion-type load balancing., , and . IPDPS, IEEE, (2006)Self-Stabilizing Balls and Bins in Batches - The Power of Leaky Bins., , , , , and . Algorithmica, 80 (12): 3673-3703 (2018)Convergence to Equilibria in Distributed, Selfish Reallocation Processes with Weighted Tasks., , , and . ESA, volume 4698 of Lecture Notes in Computer Science, page 41-52. Springer, (2007)