Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Profile-aware Daily Activity Prediction., , , , and . DSP, page 1-5. IEEE, (2023)A light-weighted ANN architecture for the classification of cyber-threats in modern communication networks., , , and . NOF, page 17-24. IEEE, (2019)A Demonstration of the BigDAWG Polystore System, , , , , , , , , and 8 other author(s). PVLDB, 8 (12): 1908--1911 (2015)Differentially Private Histograms for Range-Sum Queries: A Modular Approach., , and . CoRR, (2015)Continuous Medoid Queries over Moving Objects., , and . SSTD, volume 4605 of Lecture Notes in Computer Science, page 38-56. Springer, (2007)AI-enabled Underground Water Pipe non -destructive Inspection., , , , , and . Multim. Tools Appl., 83 (6): 18309-18332 (February 2024)Authenticated join processing in outsourced databases., , , and . SIGMOD Conference, page 5-18. ACM, (2009)Nearest keyword search in XML documents., , , and . SIGMOD Conference, page 589-600. ACM, (2011)Identifying 5G System Enhancements: Enabling Technologies for Multi-Service Networks., , , , , , , , , and 3 other author(s). CSCN, page 1-5. IEEE, (2018)Secure and efficient in-network processing of exact SUM queries., , and . ICDE, page 517-528. IEEE Computer Society, (2011)