Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bottom-up evaluation of datalog with negation., and . J. Comput. Sci. Technol., 9 (3): 229-244 (1994)Efficient Algorithms for Mining Maximal Frequent Concatenate Sequences in Biological Datasets., , , , and . CIT, page 98-104. IEEE Computer Society, (2005)An Efficient Solution to Factor Drifting Problem in the pLSA Model., , , and . CIT, page 175-181. IEEE Computer Society, (2005)LeoXSS: An Efficient XML Stream System for Processing Complex XPaths., , , , and . CIT, page 27. IEEE Computer Society, (2006)Schema-Aware Keyword Search over XML Streams., and . CIT, page 29-34. IEEE Computer Society, (2007)Extending Tree Automata to Obtain Consistent Query Answer from Inconsistent XML Document., , and . IMSCCS (2), page 488-495. IEEE Computer Society, (2006)0-7695-2581-4.Refining Web Authoritative Resource by Frequent Structures., , , , , and . IDEAS, page 250-257. IEEE Computer Society, (2003)A Privacy-Preserving Classification Mining Algorithm., , , and . PAKDD, volume 3518 of Lecture Notes in Computer Science, page 256-261. Springer, (2005)Permutation Anonymization: Improving Anatomy for Privacy Preservation in Data Publication., , , , , and . PAKDD Workshops, volume 7104 of Lecture Notes in Computer Science, page 111-123. Springer, (2011)Architecture and Implementation of an Object Multidatabase Platform Supporting Cooperation., , , , , and . CODAS, page 192-203. Springer, (1999)