Author of the publication

Efficient anomaly monitoring over moving object trajectory streams.

, , , and . KDD, page 159-168. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KOLQ in a Road Network., , , , and . MDM, page 81-90. IEEE, (2019)Rectangle Counting in Large Bipartite Graphs., , and . BigData Congress, page 17-24. IEEE Computer Society, (2014)Class Indistinguishability for Outsourcing Equality Conjunction Search., , , , , and . CLOUD, volume 11513 of Lecture Notes in Computer Science, page 253-270. Springer, (2019)Discovering Temporal Patterns for Interval-Based Events., and . DaWaK, volume 1874 of Lecture Notes in Computer Science, page 317-326. Springer, (2000)LSimRank: Node Similarity in a Labeled Graph., , , and . APWeb/WAIM (1), volume 12317 of Lecture Notes in Computer Science, page 127-144. Springer, (2020)Distributed Maximal Clique Computation and Management., , and . IEEE Trans. Serv. Comput., 9 (1): 110-122 (2016)Hierarchical Classification of Documents with Error Control., , , and . PAKDD, volume 2035 of Lecture Notes in Computer Science, page 433-443. Springer, (2001)Global privacy guarantee in serial data publishing., , , , and . ICDE, page 956-959. IEEE Computer Society, (2010)FF-Anonymity: When Quasi-identifiers Are Missing., , , and . ICDE, page 1136-1139. IEEE Computer Society, (2009)Enhancements on Local Outlier Detection., and . IDEAS, page 298-307. IEEE Computer Society, (2003)