Author of the publication

Approximate K-Median of Location Streams with Redundancy and Inconsistency.

, , , , , and . Int. J. Softw. Informatics, 4 (2): 165-182 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HilAnchor: Location Privacy Protection in the Presence of Users' Preferences., , and . J. Comput. Sci. Technol., 27 (2): 413-427 (2012)Evaluation of RDF queries via equivalence., , , , and . Frontiers Comput. Sci., 7 (1): 20-33 (2013)Attention Based Subgraph Classification for Link Prediction by Network Re-weighting., , , , , and . CIKM, page 3171-3175. ACM, (2021)Efficient Computation of k-Medians over Data Streams Under Memory Constraints., , , , , and . J. Comput. Sci. Technol., 21 (2): 284-296 (2006)RDF pattern matching using sortable views., , , , , and . CIKM, page 315-324. ACM, (2012)Location Privacy Protection in the Presence of Users' Preferences., , , , and . WAIM, volume 6897 of Lecture Notes in Computer Science, page 340-352. Springer, (2011)Dynamic Network Embedding by Time-Relaxed Temporal Random Walk., , , and . ICONIP (1), volume 13108 of Lecture Notes in Computer Science, page 426-437. Springer, (2021)Approximate K-Median of Location Streams with Redundancy and Inconsistency., , , , , and . Int. J. Softw. Informatics, 4 (2): 165-182 (2010)Visual Topic Semantic Enhanced Machine Translation for Multi-Modal Data Efficiency., , , and . J. Comput. Sci. Technol., 38 (6): 1223-1236 (December 2023)False-Negative Frequent Items Mining from Data Streams with Bursting., , , , and . DASFAA, volume 3453 of Lecture Notes in Computer Science, page 422-434. Springer, (2005)