Author of the publication

Query Expansion Using Web Access Log Files.

, and . DEXA, volume 3588 of Lecture Notes in Computer Science, page 686-695. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Partitioning Techniques for Main Memory Database: Horizontal and Single Vertical., , , and . ICCI, page 570-574. IEEE Computer Society, (1993)Impact of timing constraints on real-time database recovery., and . DART@CIKM, page 54-58. ACM, (1996)An online spatio-temporal association rule mining framework for analyzing and estimating sensor data., and . IDEAS, page 217-226. ACM, (2009)An optimistic concurrency control algorithm for mobile ad-hoc network databases., , and . IDEAS, page 199-204. ACM, (2010)Autonomous database partitioning using data mining on single computers and cluster computers., and . IDEAS, page 32-41. ACM, (2012)Indexing large-scale raster geospatial data using massively parallel GPGPU computing., , and . GIS, page 450-453. ACM, (2010)Embedding and extending GIS for exploratory analysis of large-scale species distribution data., and . GIS, page 28. ACM, (2008)Prioritized sequencing for efficient query on broadcast geographical information in mobile-computing., and . ACM-GIS, page 88-93. ACM, (2002)Transforming XSLT stylesheets into XQuery expressions and vice versa, , , , , and . Computer Languages, Systems & Structures, (2010)An Adaptive Outlier Detection Technique for Data Streams., and . SSDBM, volume 6809 of Lecture Notes in Computer Science, page 596-597. Springer, (2011)