Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Reverse k-Nearest Neighbours Search over Encrypted Multi-dimensional Databases., and . IDEAS, page 84-94. ACM, (2018)History-independence: a fresh look at the case of R-trees.. SAC, page 7-12. ACM, (2012)Processing skyline queries in temporal databases., , and . SAC, page 893-899. ACM, (2017)Processing of Spatio-Temporal Queries in Image Databases., , and . ADBIS, volume 1691 of Lecture Notes in Computer Science, page 85-97. Springer, (1999)Multiversion Linear Quadtree for Spatio-Temporal Data., , and . ADBIS-DASFAA, volume 1884 of Lecture Notes in Computer Science, page 279-292. Springer, (2000)Time split linear quadtree for indexing image databases., , and . ICIP (2), page 733-736. IEEE, (2001)Ethical Issues Surrounding Data Collection in Online Social Networks., , and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Μέθοδοι προσπέλασης και επεξεργασίας ερωτήσεων σε χρονικές και χωροχρονικές βάσεις δεδομένων. Aristotle University Of Thessaloniki, Greece, (2002)National Archive of PhD Theses: oai:10442/20183.Consequences of Publishing Real Personal Information in Online Social Networks., , and . Encyclopedia of Social Network Analysis and Mining, (2014)SQL-IDS: a specification-based approach for SQL-injection detection., and . SAC, page 2153-2158. ACM, (2008)