Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ownership protection of shape datasets with geodesic distance preservation., , , and . EDBT, volume 261 of ACM International Conference Proceeding Series, page 276-286. ACM, (2008)Optimal Distance Bounds on Time-Series Data., , and . SDM, page 109-120. SIAM, (2009)Right-Protected Data Publishing with Provable Distance-Based Mining., , , and . IEEE Trans. Knowl. Data Eng., 26 (8): 2014-2028 (2014)Approximate matrix multiplication with application to linear embeddings., , and . ISIT, page 2182-2186. IEEE, (2014)Trajectories, Discovering Similar., , and . Encyclopedia of GIS, Springer, (2017)RIVA: Indexing and Visualization of High-Dimensional Data Via Dimension Reorderings., , , and . PKDD, volume 4213 of Lecture Notes in Computer Science, page 407-420. Springer, (2006)Very-Low Random Projection Maps., and . EDBT, page 421-424. OpenProceedings.org, (2018)On K-Means Cluster Preservation Using Quantization Schemes., , and . ICDM, page 533-542. IEEE Computer Society, (2009)Discovering Similar Multidimensional Trajectories., , and . ICDE, page 673-684. IEEE Computer Society, (2002)Templated Search over Relational Databases., , and . CIKM, page 21-30. ACM, (2014)