Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extensible Buffer Management of Indexes., , and . VLDB, page 444-454. Morgan Kaufmann, (1992)Text Classification without Negative Examples Revisit, and . IEEE Transactions on Knowledge and Data Engineering, 18 (1): 6--20 (2006)Multilevel Security Control in Multidatabase Management Systems., , and . RIDE-IMS, page 359-363. IEEE Computer Society, (1991)Exception Rule Mining with a Relative Interestingness Measure., , , and . PAKDD, volume 1805 of Lecture Notes in Computer Science, page 86-97. Springer, (2000)A study of database buffer management approaches: towards the development of a data mining based strategy., , and . SMC, page 2715-2719. IEEE, (1998)On Processing Multi-Joins in Parallel Systems., and . Parallel Process. Lett., (1991)Performance Evaluation of a DOM-Based XML Database: Storage, Indexing and Query Optimization., , , , , and . WAIM, volume 2419 of Lecture Notes in Computer Science, page 13-24. Springer, (2002)False-Negative Frequent Items Mining from Data Streams with Bursting., , , , and . DASFAA, volume 3453 of Lecture Notes in Computer Science, page 422-434. Springer, (2005)Parameter Free Bursty Events Detection in Text Streams., , , and . VLDB, page 181-192. ACM, (2005)Workload Scheduling for Multiple Query Processing., and . Inf. Process. Lett., 55 (5): 251-257 (1995)