Author of the publication

Mining (Social) Network Graphs to Detect Random Link Attacks.

, , and . ICDE, page 486-495. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logical and Physical Versioning in Main Memory Databases., , , , , and . VLDB, page 86-95. Morgan Kaufmann, (1997)Efficient Global Transaction Management in Multidatabase Systems., , , , and . DASFAA, volume 4 of Advanced Database Research and Development Series, page 29-36. World Scientific, (1993)Mining Optimized Gain Rules for Numeric Attributes., , and . IEEE Trans. Knowl. Data Eng., 15 (2): 324-338 (2003)Efficient Detection of Distributed Constraint Violations., , , and . COMAD, page 230-239. Tata McGraw-Hill Publishing Company Limited, (2006)Mining Optimized Gain Rules for Numeric Attributes., , and . KDD, page 135-144. ACM, (1999)A Scalable Algorithm for Higher-order Features Generation using MinHash., , and . CIKM, page 1213-1222. ACM, (2018)Regular Expression Indexing., , and . Encyclopedia of Algorithms, Springer, (2008)Leveraging Uncertainty Estimates To Improve Classifier Performance., , , and . CoRR, (2023)CURE: An Efficient Clustering Algorithm for Large Databases., , and . SIGMOD Conference, page 73-84. ACM Press, (1998)Of Crawlers, Portals, Mice and Men: Is there more to Mining the Web? (Panel)., , , and . SIGMOD Conference, page 504. ACM Press, (1999)SIGMOD Record 28(2), June 1999.