Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Conflict Structures in Inconsistent Databases., and . ADBIS, volume 6295 of Lecture Notes in Computer Science, page 320-335. Springer, (2010)View-Based Tree-Language Rewritings for XML., and . FoIKS, volume 8367 of Lecture Notes in Computer Science, page 270-289. Springer, (2014)Modeling non-progressive phenomena for influence propagation., , , and . COSN, page 131-138. ACM, (2014)EPIC: Welfare Maximization under Economically Postulated Independent Cascade Model., , and . CoRR, (2018)Expressive power of an algebra for data mining., , , and . ACM Trans. Database Syst., 31 (4): 1169-1214 (2006)On Implementing SchemaLog - A Database Programming Language., , , and . CIKM, page 309-316. ACM, (1996)CELF++: optimizing the greedy algorithm for influence maximization in social networks., , and . WWW (Companion Volume), page 47-48. ACM, (2011)HeteroMF: recommendation in heterogeneous information networks using context dependent factor models., and . WWW, page 643-654. International World Wide Web Conferences Steering Committee / ACM, (2013)A Data-Based Approach to Social Influence Maximization., , and . Proc. VLDB Endow., 5 (1): 73-84 (2011)Generating Top-k Packages via Preference Elicitation., , and . Proc. VLDB Endow., 7 (14): 1941-1952 (2014)