Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification spanning correlated data streams., , , , and . CIKM, page 132-141. ACM, (2006)Multi-Dimensional Sequential Pattern Mining., , , , , and . CIKM, page 81-88. ACM, (2001)Study of the Off-Axis Fresnel Zone Plate of a Microscopic Tomographic Aberration., , , , , , , , , and 2 other author(s). Sensors, 22 (3): 1113 (2022)Computing Closed Skycubes., , and . Proc. VLDB Endow., 3 (1): 838-847 (2010)Dealer: An End-to-End Model Marketplace with Differential Privacy., , , , , and . Proc. VLDB Endow., 14 (6): 957-969 (2021)From Good to Best: Two-Stage Training for Cross-Lingual Machine Reading Comprehension., , , and . AAAI, page 10501-10508. AAAI Press, (2022)Personalized Cross-Silo Federated Learning on Non-IID Data., , , , , , and . AAAI, page 7865-7873. AAAI Press, (2021)Towards Scalable and Accurate Online Feature Selection for Big Data., , , and . ICDM, page 660-669. IEEE Computer Society, (2014)SNOC: Streaming Network Node Classification., , , and . ICDM, page 150-159. IEEE Computer Society, (2014)(alpha, k)-anonymity Based Privacy Preservation by Lossy Join., , , , , and . APWeb/WAIM, volume 4505 of Lecture Notes in Computer Science, page 733-744. Springer, (2007)