Author of the publication

Answering the Why-Not Questions of Graph Query Autocompletion.

, , , , and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 332-341. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collateral damage: Exchange controls and international trade, and . Journal of International Money and Finance, 26 (5): 841--863 (September 2007)Active hashing with joint data example and tag selection., , , and . SIGIR, page 405-414. ACM, (2014)Live Demonstration: Wearable Body Area Network System Based on Low Power Body Channel Communication., , , and . BioCAS, page 1. IEEE, (2019)Network security defense model based on firewall and IPS., , and . J. Intell. Fuzzy Syst., 39 (6): 8961-8969 (2020)An Almost Non-interactive Order Preserving Encryption Scheme., , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 87-100. Springer, (2018)TuFast: A Lightweight Parallelization Library for Graph Analytics., , and . ICDE, page 710-721. IEEE, (2019)Quantum-Inspired Perfect Matching under Vertex-Color Constraints., and . CoRR, (2022)Underdetermined blind source separation method based on quantum Archimedes optimization algorithm., , , and . Appl. Intell., 53 (11): 13763-13800 (June 2023)Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks., , , and . Appl. Soft Comput., (2019)Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking., , , , , and . Blockchain, page 68-73. IEEE, (2023)