Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint-Based Rule Mining in Large, Dense Databases, , , , , , and . page 188--197. (1999)Vinci: A Service-Oriented Architecture for Rapid Development of Web Applications, , , and . Proceedings of the Tenth International World Wide Web Conference, page 355-365. Hong Kong, ACM Press, (May 2001)Predicting bounce rates in sponsored search advertisements., , , and . KDD, page 1325-1334. ACM, (2009)Fast Algorithms for Finding Extremal Sets., and . SDM, page 25-34. SIAM / Omnipress, (2011)Merkle tree authentication of HTTP responses., and . WWW (Special interest tracks and posters), page 1182-1183. ACM, (2005)The Hows, Whys, and Whens of Constraints in Itemset and Rule Discovery.. Constraint-Based Mining and Inductive Databases, volume 3848 of Lecture Notes in Computer Science, page 1-13. Springer, (2004)An Evaluation of Binary XML Encoding Optimizations for Fast Stream Based XML Processing, , , and . Proceedings of the Thirteenth International World Wide Web Conference, page 345-354. New York, NY, ACM Press, (May 2004)Data Privacy Through Optimal k-Anonymization, and . Proceedings of the 21st International Conference on Data Engineering (ICDE 2005)., page 217--228. IEEE, (2005)Constraint-Based Rule Mining in Large, Dense Databases., , and . Data Min. Knowl. Discov., 4 (2/3): 217-240 (2000)A New Approach to Modularity in Rule-Based Programming., , , , , , , , , and 4 other author(s). ICTAI, page 18-25. IEEE Computer Society, (1994)