Author of the publication

Estimating Range Queries using Aggregate Data with Integrity Constraints: a Probabilistic Approach

, , and . CoRR, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Offline cleaning of RFID trajectory data., , , and . SSDBM, page 5:1-5:12. ACM, (2014)Efficient and effective RFID data warehousing., , , and . IDEAS, page 251-258. ACM, (2009)Towards a Grid-Based Framework for Supporting Range Aggregate Queries Over Big Sensor Network Readings: Overview, Management, and Applications., , and . Int. J. Distributed Syst. Technol., 13 (1): 1-20 (2022)Binary-Tree Histograms with Tree Indices., , , and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 861-870. Springer, (2002)Enabling OLAP in mobile environments via intelligent data cube compression techniques., , and . J. Intell. Inf. Syst., 33 (2): 95-143 (2009)On the Interpretation of Traces of Low Level Events in Business Process Logs., , , , and . SEBD, volume 2161 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Repairs and Consistent Answers for XML Data with Functional Dependencies., , , and . Xsym, volume 2824 of Lecture Notes in Computer Science, page 238-253. Springer, (2003)Argumentation Meets Process Mining: an Architecture for Log Interpretation., , , and . AI³@AI*IA, volume 3086 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Probabilistic AAFs with Marginal Probabilities., , and . AI³@AI*IA, volume 3354 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)Privacy or Security?: Take A Look And Then Decide., , , and . SSDBM, page 23:1-23:4. ACM, (2016)