Author of the publication

On using cache conscious clustering for improving OODBMS performance.

, , and . Information & Software Technology, 48 (11): 1073-1082 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Robin Rainer Herkert University of Stuttgart

Replication Code for: Greedy Kernel Methods for Approximating Breakthrough Curves for Reactive Flow from 3D Porous Geometry Data. Software, (2024)Related to: R. Herkert, P. Buchfink, T. Wenzel, B. Haasdonk, P. Toktaliev, O. Iliev (2024), "Greedy Kernel Methods for Approximating Breakthrough Curves for Reactive Flow from 3D Porous Geometry Data". arXiv: 2405.19170.
 

Other publications of authors with the same name

AM/FM halftoning: digital halftoning through simultaneous modulation of dot size and dot density., and . J. Electronic Imaging, 13 (2): 286-302 (2004)Optimal control design based on reinforcement learning for a class of nonlinear distributed systems., and . ICCA, page 384-389. IEEE, (2013)Pulmonary nodule classification with deep residual networks., , and . Int. J. Comput. Assist. Radiol. Surg., 12 (10): 1799-1808 (2017)Boosting Moving Object Indexing through Velocity Partitioning., , , and . PVLDB, 5 (9): 860-871 (2012)LASSO-based diagnosis scheme for multistage processes with binary data., , , and . Computers & Industrial Engineering, (2014)Real-time continuous intersection joins over large sets of moving objects using graphic processing units., , , and . VLDB J., 23 (6): 965-985 (2014)Platypus: Design and Implementation of a Flexible High Performance Object Store., , , and . POS, volume 2135 of Lecture Notes in Computer Science, page 100-124. Springer, (2000)Modeling and analysis of DC voltage dynamics in modular multilevel converter., , , and . IECON, page 4531-4537. IEEE, (2017)A Protection Method of Wavelength Security Based on DWDM Optical Networks., , and . ICIC (3), volume 10363 of Lecture Notes in Computer Science, page 625-633. Springer, (2017)Evaluation of Two-Stage Ensemble Evolutionary Algorithm for Numerical Optimization., , , and . ICSI (1), volume 6728 of Lecture Notes in Computer Science, page 539-548. Springer, (2011)