From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sleepers and Workaholics: Caching Strategies in Mobile Environments, и . VLDB J., 4 (4): 567-602 (1995)The Role of Approximations in Maintaining and Using Aggregate Views., и . IEEE Data Eng. Bull., 22 (4): 15-21 (1999)An Approximate Median Polish Algorithm for Large Multidimensional Data Sets., и . Knowl. Inf. Syst., 5 (4): 416-438 (2003)Replicated Data Management in Mobile Environments: Anything New Under the Sun?, и . Applications in Parallel and Distributed Computing, том A-44 из IFIP Transactions, стр. 237-246. North-Holland, (1994)Mining Malicious Corruption of Data with Hidden Markov Models., , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 175-189. Kluwer, (2002)Maintaining Availability of Replicated Data in a Dynamic Failure Environment., , и . SRDS, стр. 177-187. IEEE Computer Society, (1987)Mobile Computing and Databases - A Survey.. IEEE Trans. Knowl. Data Eng., 11 (1): 108-117 (1999)The Management of Probabilistic Data., , и . IEEE Trans. Knowl. Data Eng., 4 (5): 487-502 (1992)The Demarcation Protocol: A Technique for Maintaining Linear Arithmetic Constraints in Distributed Database Systems., и . EDBT, том 580 из Lecture Notes in Computer Science, стр. 373-388. Springer, (1992)Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users., , , и . RAID, том 9404 из Lecture Notes in Computer Science, стр. 405-424. Springer, (2015)