Author of the publication

On the Discovery of Weak Periodicities in Large Time Series.

, , , , and . PKDD, volume 2431 of Lecture Notes in Computer Science, page 51-61. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Authenticated Comparisons., , and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 514-531. (2011)Parallel Geometric Algorithms in Coarse-Grain Network Models., and . COCOON, volume 1449 of Lecture Notes in Computer Science, page 55-64. Springer, (1998)An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications., , and . ESA, volume 726 of Lecture Notes in Computer Science, page 13-24. Springer, (1993)Parallel Algorithms for Longest Increasing Chains in the Plane and Related Problems., , and . Parallel Process. Lett., 9 (4): 511-520 (1999)Secure two-party input-size reduction: Challenges, solutions and applications., , and . Inf. Sci., (2021)Information Embedding for Secure Manufacturing: Challenges and Research Opportunities., , , and . J. Comput. Inf. Sci. Eng., (December 2023)A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming., , , , and . IEEE Trans. Knowl. Data Eng., 17 (7): 1010-1014 (2005)New Clique and Independent Set Algorithms for Circle Graphs (Discrete Applied Mathematics 36 (1992) 1-24)., , and . Discret. Appl. Math., 41 (2): 179-180 (1993)New clique and independent set algorithms for circle graphs., , and . Discret. Appl. Math., 36 (1): 1-24 (1992)Securely outsourcing linear algebra computations., and . AsiaCCS, page 48-59. ACM, (2010)