Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations., , , and . VLDB, page 416-425. Morgan Kaufmann, (1997)SP2: spanner construction for shortest path computation on streaming graph., , , , and . EDB, page 43-50. ACM, (2016)More reputable recommenders give more accurate recommendations?, , , , and . ICUIMC, page 24. ACM, (2013)Mining Weighted Frequent Patterns Using Adaptive Weights., , , and . IDEAL, volume 5326 of Lecture Notes in Computer Science, page 258-265. Springer, (2008)Middleware Architecture for Context Knowledge Discovery in Ubiquitous Computing., , and . EUC, volume 3824 of Lecture Notes in Computer Science, page 1177-1188. Springer, (2005)Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments., , , , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 357-360. Springer, (2006)Mining Weighted Frequent Patterns in Incremental Databases., , , and . PRICAI, volume 5351 of Lecture Notes in Computer Science, page 933-938. Springer, (2008)Video Big Data Analytics in the Cloud: Research Issues and Challenges., , , , , and . CoRR, (2020)Finding Reliable Recommendations for Trust Model., , , , and . WISE, volume 4255 of Lecture Notes in Computer Science, page 375-386. Springer, (2006)Correlated subgraph search for multiple query graphs in graph streams., , , and . IMCOM, page 49:1-49:7. ACM, (2015)