Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overview of the 2003 KDD Cup, , and . SIGKDD Explor. Newsl., 5 (2): 149--151 (December 2003)An Evaluation of Checkpoint Recovery for Massively Multiplayer Online Games, , , , , , and . PVLDB, 2 (1): 1258--1269 (2009)Database research opportunities in computer games., , , , and . SIGMOD Record, 36 (3): 7-13 (2007)Hashtag Recommendation for Enterprise Applications., , , , , , and . CIKM, page 893-902. ACM, (2016)Blotter: Low Latency Transactions for Geo-Replicated Storage., , , , , and . WWW, page 263-272. ACM, (2017)Beyond myopic inference in big data pipelines., , , and . KDD, page 86-94. ACM, (2013)The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis., , , , , , , and . SIGMOD Conference, page 1311-1326. ACM, (2015)Fine-grained disclosure control for app ecosystems., , , and . SIGMOD Conference, page 869-880. ACM, (2013)DualMiner: a dual-pruning algorithm for itemsets with constraints., , , and . KDD, page 42-51. ACM, (2002)What is "next" in event processing?, , , and . PODS, page 263-272. ACM, (2007)