Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Anonymity., and . PinKDD, volume 4890 of Lecture Notes in Computer Science, page 56-79. Springer, (2007)Operator scheduling in data stream systems., , , , and . VLDB J., 13 (4): 333-353 (2004)Anonymizing Tables., , , , , , and . ICDT, volume 3363 of Lecture Notes in Computer Science, page 246-258. Springer, (2005)A Hierarchical Clustering Algorithm for Characterizing Social Media Users., , , and . WWW (Companion Volume), page 353-362. ACM / IW3C2, (2020)Architecting the Database Access for a IT Infrastructure and Data Center Monitoring Tool., , , , , , , , , and . ICDE Workshops, page 351-354. IEEE Computer Society, (2012)Auditing SQL Queries., , and . ICDE, page 287-296. IEEE Computer Society, (2008)Generating Queries with Cardinality Constraints for DBMS Testing., , and . IEEE Trans. Knowl. Data Eng., 18 (12): 1721-1725 (2006)Querying priced information in databases: The conjunctive case., , , , , , , and . ACM Trans. Algorithms, 3 (1): 9:1-9:22 (2007)Caching queues in memory buffers., and . SODA, page 541-549. SIAM, (2004)Data Privacy Using MASKETEERTM., , , , and . ICTAC, volume 7521 of Lecture Notes in Computer Science, page 151-158. Springer, (2012)