Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Confidentiality via Camouflage: The CVC Approach to Disclosure Limitation When Answering Queries to Databases., , and . Operations Research, 50 (3): 501-516 (2002)When Econometrics Meets Machine Learning., , , , , , , and . Data Inf. Manag., 1 (2): 75-83 (2017)A practical approach for efficiently answering top-k relational queries., , and . Decis. Support Syst., 44 (1): 326-349 (2007)Identity matching and information acquisition: Estimation of optimal threshold parameters., , , , and . Decis. Support Syst., (2014)Seller heterogeneity in electronic marketplaces: A study of new and experienced sellers in eBay., , and . Decis. Support Syst., (2013)A Query-Driven Approach to the Design and Management of Flexible Database Systems., , and . J. Manag. Inf. Syst., 19 (3): 121-154 (2003)Pricing and Allocation for Quality-Differentiated Online Services., , and . Manag. Sci., 51 (7): 1141-1150 (2005)Analysis of Effective Service Time with Age Dependent Interruptions and Its Application to Optimal Rollback Policy for Database Management., , and . Queueing Syst. Theory Appl., 4 (3): 193-212 (1989)Reactivity in Online Auctions., , , and . EDBT Workshops, volume 4254 of Lecture Notes in Computer Science, page 909-918. Springer, (2006)Big Data - Analytics Engine for Digital Transformation: Where is IS?. AMCIS, Association for Information Systems, (2015)