From post

Garaph: Efficient GPU-accelerated Graph Processing on a Single Machine with Balanced Replication.

, , , , и . USENIX Annual Technical Conference, стр. 195-207. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions., , , , и . ICASSP, стр. 3477-3480. IEEE, (2009)DSwitch: a dual mode direct and network attached disk., , и . SoCC, стр. 71-83. ACM, (2015)Understanding and Surpassing Dropbox: Efficient Incremental Synchronization in Cloud Storage Services., , , и . GLOBECOM, стр. 1-7. IEEE, (2015)Understanding the Gift-Sending Interaction on Live-Streaming Video Websites., , и . HCI (12), том 10282 из Lecture Notes in Computer Science, стр. 274-285. Springer, (2017)Processing Concurrent Graph Analytics with Decoupled Computation Model., , , и . IEEE Trans. Computers, 66 (5): 876-890 (2017)Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator., , , и . J. Comput. Sci. Technol., 24 (5): 855-867 (2009)Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage., , , , и . IEEE Trans. Parallel Distributed Syst., 22 (9): 1514-1527 (2011)Understanding Sybil Groups in the Wild., , , , и . J. Comput. Sci. Technol., 30 (6): 1344-1357 (2015)Understanding the performance of offline download in real p2p networks., , , , и . Peer-to-Peer Netw. Appl., 8 (6): 992-1007 (2015)VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils., , , , и . IEEE Trans. Dependable Secur. Comput., 13 (4): 488-501 (2016)