Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guided weak supervision for action recognition with scarce data to assess skills of children with autism., , , and . CoRR, (2019)The Online Event-Detection Problem., , , , , , , and . CoRR, (2018)A General-Purpose Counting Filter: Making Every Bit Count., , , and . SIGMOD Conference, page 775-787. ACM, (2017)Cloud computing., , and . ICWET, page 1011. ACM, (2010)Gegenbauer wavelet operational matrix method for solving variable-order non-linear reaction-diffusion and Galilei invariant advection-diffusion equations., , and . Comput. Appl. Math., (2019)Performance Virtualization for Large-Scale Storage Systems., , , , , , and . SRDS, page 109-118. IEEE Computer Society, (2003)Writes Wrought Right, and Other Adventures in File System Optimization., , , , , , , , , and 4 other author(s). TOS, 13 (1): 3:1-3:26 (2017)Buffered Count-Min Sketch on SSD: Theory and Experiments., , , and . ESA, volume 112 of LIPIcs, page 41:1-41:15. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2018)Cloud Analytics: Do We Really Need to Reinvent the Storage Stack?, , , , , , and . HotCloud, USENIX Association, (2009)Experiences with building an intrusion-tolerant group communication system., , , and . Softw., Pract. Exper., 38 (6): 639-666 (2008)