Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

First-Order Logic Characterization of Program Properties., and . IEEE Trans. Knowl. Data Eng., 6 (4): 518-533 (1994)Area precision of the features abstracted from SPOT5 image., , and . IGARSS, page 3349-3352. IEEE, (2007)A nonlocal interferometric phase filtering strategy for practical InSAR system., , , and . IGARSS, page 6425-6428. IEEE, (2016)Enforce Constraints in Archival Databases., and . ICCI, page 397-400. IEEE Computer Society, (1992)PassApp: My App is My Password!, , , , and . MobileHCI, page 306-315. ACM, (2015)Schema Discovery for Semistructured Data, and . KDD, page 271--274. (1997)Scalable sequential pattern mining for biological sequences., , and . CIKM, page 178-187. ACM, (2004)On the On-Line Weighted k-Taxi Problem., and . ESCAPE, volume 4614 of Lecture Notes in Computer Science, page 152-162. Springer, (2007)Incremental Database Design Revisited., and . ICCI, volume 497 of Lecture Notes in Computer Science, page 219-230. Springer, (1991)Profit Mining: From Patterns to Actions., , and . EDBT, volume 2287 of Lecture Notes in Computer Science, page 70-87. Springer, (2002)