Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rational design for over-production of desirable microbial metabolites by precision engineering., , , , , , , , and . Antonie van Leeuwenhoek, (Apr 18, 2010)Human Flesh Search Engine and Online Privacy., and . Science and Engineering Ethics, 22 (2): 601-604 (2016)iKey: An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques., , , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 284-295. Springer, (2018)Detecting Top-k Active Inter-Community Jumpers in Dynamic Information Networks., , , , and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 538-546. Springer, (2018)ε-Approximation to data streams in sensor networks., , and . INFOCOM, page 1663-1671. IEEE, (2013)Discovery of Field Functional Dependencies., , , and . ISKE, page 448-455. IEEE, (2015)Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services., , , , , and . IEEE Access, (2017)Graph-based reference table construction to facilitate entity matching., , , and . J. Syst. Softw., 86 (6): 1679-1688 (2013)Italian domination in the Cartesian product of paths., , and . J. Comb. Optim., 41 (2): 526-543 (2021)Who Should Deserve Investment? Attractive Individual and Group Search in Dynamic Information Networks (Extended Abstract)., , , and . ICDE, page 1481-1482. IEEE, (2022)