Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using RDMA efficiently for key-value services., , and . SIGCOMM, page 295-306. ACM, (2014)Cuckoo Linear Algebra., , , and . KDD, page 1553-1562. ACM, (2015)Topology inference from BGP routing dynamics., , , and . Internet Measurement Workshop, page 243-248. ACM, (2002)Balancing throughput, robustness, and in-order delivery in P2P VoD., , , and . CoNEXT, page 10. ACM, (2010)Switching the optical divide: fundamental challenges for hybrid electrical/optical datacenter networks., , , , , , , , and . SoCC, page 30. ACM, (2011)Using vector interfaces to deliver millions of IOPS from a networked key-value storage server., , and . SoCC, page 8. ACM, (2012)Technical perspective: A whitebox solution for blackbox-like behaviors.. Commun. ACM, 62 (11): 136 (2019)Mainstream: Dynamic Stem-Sharing for Multi-Tenant Video Processing., , , , , , , , , and . USENIX Annual Technical Conference, page 29-42. USENIX Association, (2018)SILT: a memory-efficient, high-performance key-value store., , , and . SOSP, page 1-13. ACM, (2011)3LC: Lightweight and Effective Traffic Compression for Distributed Machine Learning., , and . CoRR, (2018)