Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Top-k Maximal Influential Paths in Network Data., , , and . DEXA (1), volume 7446 of Lecture Notes in Computer Science, page 369-383. Springer, (2012)Inferring Topic-Level Influence from Network Data., , , and . DEXA (2), volume 8645 of Lecture Notes in Computer Science, page 131-146. Springer, (2014)Keeping Master Green at Scale., , , , , , and . EuroSys, page 29:1-29:15. ACM, (2019)Efficient Mining of Lag Patterns in Evolving Time Series., , and . Trans. Large Scale Data Knowl. Centered Syst., (2013)Detecting click fraud in online advertising: a data mining approach., , , , , , , , , and 8 other author(s). J. Mach. Learn. Res., 15 (1): 99-140 (2014)Spatial Co-location Pattern Mining - A new perspective using Graph Database., , and . CoRR, (2018)A Transformer-based Framework for Multivariate Time Series Representation Learning., , , , and . CoRR, (2020)Time Series Clustering for Human Behavior Pattern Mining., , , and . CoRR, (2021)Mobile health application for early disease outbreak-period detection., , , and . Healthcom, page 483-488. IEEE, (2014)TiDE: Template-Independent Discourse Data Extraction., , and . DaWaK, volume 9263 of Lecture Notes in Computer Science, page 149-162. Springer, (2015)