Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Samaneh Vahid Dastjerdi University of Stuttgart

Data for: Formation of common preferential two-phase displacement pathways in porous media, , and . Dataset, (2024)Related to: Vahid Dastjerdi, S.; Karadimitriou, N.; Hassanizadeh, S. M. & Steeb, H.: Formation of common preferential two-phase displacement pathways in porous media. Water Resources Research (Submitted Jan. 2024).
Data for: Formation of common preferential two-phase displacement pathways in porous media, , and . Dataset, (2024)Related to: Vahid Dastjerdi, S.; Karadimitriou, N.; Hassanizadeh, S. M. & Steeb, H.: Formation of common preferential two-phase displacement pathways in porous media. Water Resources Research (Submitted Jan. 2024).Image processing code for characterization of multiphase flow in porous media, and . Software, (2024)Related to: Vahid Dastjerdi, S.; Karadimitriou, N.; Hassanizadeh, S. M. & Steeb, H.: Experimental evaluation of fluid connectivity in two-phase flow in porous media during drainage. Water Resources Research 58 (2022), e2022WR033451. doi: 10.1029/2022WR033451.
 

Other publications of authors with the same name

SPOOF: Sum-Product Optimization and Operator Fusion for Large-Scale Machine Learning., , , , , , and . CIDR, www.cidrdb.org, (2017)Financial Analytics from Public Data., , , , , , and . DSMM, page 4:1-4:6. ACM, (2014)MNC: Structure-Exploiting Sparsity Estimation for Matrix Expressions., , , , and . SIGMOD Conference, page 1607-1623. ACM, (2019)Compiling machine learning algorithms with SystemML., , , , , , and . SoCC, page 57:1. ACM, (2013)Privacy preserving mining of association rules., , , and . Inf. Syst., 29 (4): 343-364 (2004)A probabilistic algorithm for updating files over a communication link.. Theor. Comput. Sci., 233 (1-2): 191-199 (2000)Epistemic privacy., , and . J. ACM, 58 (1): 2:1-2:45 (2010)Information technology for healthcare transformation., , , , , , , , , and 32 other author(s). IBM Journal of Research and Development, 55 (5): 6 (2011)A Probabilistic Algorithm for Updating Files over a Communication Link.. SODA, page 300-305. ACM/SIAM, (1998)On Optimizing Operator Fusion Plans for Large-Scale Machine Learning in SystemML., , , , and . CoRR, (2018)