Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing High-Level Representations of Video Clips using VideoTrails., , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3312 of SPIE Proceedings, page 81-92. SPIE, (1998)Adaptive, Automatic Stream Mining., , and . Data Stream Management, Springer, (2016)SuperGraph Visualization., , , and . CoRR, (2015)Tri-Fly: Distributed Estimation of Global and Local Triangle Counts in Graph Streams., , , , and . PAKDD (3), volume 10939 of Lecture Notes in Computer Science, page 651-663. Springer, (2018)MalSpot: Multi2 Malicious Network Behavior Patterns Analysis., , , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 1-14. Springer, (2014)Inferring Strange Behavior from Connectivity Pattern in Social Networks., , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 126-138. Springer, (2014)Future directions in data mining: streams, networks, self-similarity and power laws.. CIKM, page 93. ACM, (2002)F4: large-scale automated forecasting using fractals., and . CIKM, page 2-9. ACM, (2002)Selectivity Estimation of Window Queries., and . CIKM, page 340-347. ACM, (1998)Graph mining and influence propagation.. WICOW, page 1-2. ACM, (2008)