Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spotting opinion spammers using behavioral footprints., , , , , , and . KDD, page 632-640. ACM, (2013)Probabilistic, context-sensitive, and goal-oriented service selection., , , and . ICSOC, page 316-321. ACM, (2004)Predictive business operations management., , , , and . Int. J. Comput. Sci. Eng., 2 (5/6): 292-301 (2006)Optimization of Analytic Data Flows for Next Generation Business Intelligence Applications., , , , and . TPCTC, volume 7144 of Lecture Notes in Computer Science, page 46-66. Springer, (2011)Of Cubes, DAGs and Hierarchical Correlations: A Novel Conceptual Model for Analyzing Social Media Data., , , , and . ER, volume 7532 of Lecture Notes in Computer Science, page 30-49. Springer, (2012)QoX-driven ETL design: reducing the cost of ETL consulting engagements., , , and . SIGMOD Conference, page 953-960. ACM, (2009)Data-Driven Contextual Valence Shifter Quantification for Multi-Theme Sentiment Analysis., , , , and . CIKM, page 939-948. ACM, (2016)Leveraging web streams for contractual situational awareness in operational BI., , , and . EDBT/ICDT Workshops, ACM, (2010)Performance optimization for distributed intra-node-parallel streaming systems., , , and . ICDE Workshops, page 62-69. IEEE Computer Society, (2013)A Semantic-Discriminated Approach to Integration of Federated Databases., , and . CoopIS, page 19-31. (1995)