Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Implementing SchemaLog - A Database Programming Language., , , and . CIKM, page 309-316. ACM, (1996)Uncertain Deductive Databases: A Hybrid Approach., and . Inf. Syst., 22 (8): 483-508 (1997)EPIC: Welfare Maximization under Economically Postulated Independent Cascade Model., , and . CoRR, (2018)Expressive power of an algebra for data mining., , , and . ACM Trans. Database Syst., 31 (4): 1169-1214 (2006)CELF++: optimizing the greedy algorithm for influence maximization in social networks., , and . WWW (Companion Volume), page 47-48. ACM, (2011)Modeling non-progressive phenomena for influence propagation., , , and . COSN, page 131-138. ACM, (2014)HeteroMF: recommendation in heterogeneous information networks using context dependent factor models., and . WWW, page 643-654. International World Wide Web Conferences Steering Committee / ACM, (2013)View-Based Tree-Language Rewritings for XML., and . FoIKS, volume 8367 of Lecture Notes in Computer Science, page 270-289. Springer, (2014)Exploiting Conflict Structures in Inconsistent Databases., and . ADBIS, volume 6295 of Lecture Notes in Computer Science, page 320-335. Springer, (2010)Cohort Representation and Exploration., , and . DSAA, page 169-178. IEEE, (2018)