Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint-Based Rule Mining in Large, Dense Databases, , , , , , and . page 188--197. (1999)Vinci: A Service-Oriented Architecture for Rapid Development of Web Applications, , , and . Proceedings of the Tenth International World Wide Web Conference, page 355-365. Hong Kong, ACM Press, (May 2001)Merkle tree authentication of HTTP responses., and . WWW (Special interest tracks and posters), page 1182-1183. ACM, (2005)Fast Algorithms for Finding Extremal Sets., and . SDM, page 25-34. SIAM / Omnipress, (2011)Predicting bounce rates in sponsored search advertisements., , , and . KDD, page 1325-1334. ACM, (2009)Privacy-preserving indexing of documents on the network., , , and . VLDB J., 18 (4): 837-856 (2009)PLANET: Massively Parallel Learning of Tree Ensembles with MapReduce., , , and . Proc. VLDB Endow., 2 (2): 1426-1437 (2009)Introduction to special issue ACM SIGKDD 2006., , , , and . ACM Trans. Knowl. Discov. Data, 1 (3): 9 (2007)The Hows, Whys, and Whens of Constraints in Itemset and Rule Discovery.. Constraint-Based Mining and Inductive Databases, volume 3848 of Lecture Notes in Computer Science, page 1-13. Springer, (2004)Data Privacy Through Optimal k-Anonymization, and . Proceedings of the 21st International Conference on Data Engineering (ICDE 2005)., page 217--228. IEEE, (2005)