Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring Streams: A New Class of Data Management Applications, , , , , , , , and . VLDB '02: Proceedings of the 28th international conference on Very Large Data Bases, page 215--226. VLDB Endowment, (2002)Metro-Viz: Black-Box Analysis of Time Series Anomaly Detectors., , , , and . CHI Extended Abstracts, ACM, (2019)Greenhouse: A Zero-Positive Machine Learning System for Time-Series Anomaly Detection., , , , and . CoRR, (2018)Interactive Search and Exploration of Waveform Data with Searchlight., , and . SIGMOD Conference, page 2105-2108. ACM, (2016)FastDAWG: Improving Data Migration in the BigDAWG Polystore System., , , , and . Poly/DMAH@VLDB, volume 11470 of Lecture Notes in Computer Science, page 3-15. Springer, (2018)Integrating real-time and batch processing in a polystore., , , , , , and . HPEC, page 1-7. IEEE, (2016)Visual Exploration of Time Series Anomalies with Metro-Viz., , , and . SIGMOD Conference, page 1901-1904. ACM, (2019)An Optimal Relational Database Encryption Scheme., , , and . IACR Cryptology ePrint Archive, (2020)Encrypted Databases: From Theory to Systems., , , and . CIDR, www.cidrdb.org, (2021)Precision and Recall for Time Series., , , , and . NeurIPS, page 1924-1934. (2018)