Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WATCHMAN : A Data Warehouse Intelligent Cache Manager., , and . VLDB, page 51-62. Morgan Kaufmann, (1996)Protecting Private Data on Mobile Systems based on Spatio-temporal Analysis., , , and . PECCS, page 114-123. SciTePress, (2011)Modelling the Information Space in Physical Storage at Different Levels of Detail.. Comput. J., 20 (3): 248-256 (1977)Bypassing holes in sensor networks: Load-balance vs. latency., , , , , and . Ad Hoc Networks, (2017)Efficient location aware intrusion detection to protect mobile devices., , , , and . Personal and Ubiquitous Computing, 18 (1): 143-162 (2014)Storage Mappings for Multidimensional Linear Dynamic Hashing., and . PODS, page 90-105. ACM, (1983)Efficient data reduction with EASE., , , , and . KDD, page 59-68. ACM, (2003)Range queries for mobile objects in wireless sensor networks., , and . GIS, page 504-507. ACM, (2009)A Recovery Scheme for Multidatabase Systems., and . CIKM, page 665-673. ACM, (1993)Adaptive and Context-Aware Reconciliation of Reactive and Pro-active Behavior in Evolving Systems., and . Active Conceptual Modeling of Learning, volume 4512 of Lecture Notes in Computer Science, page 30-46. Springer, (2006)