Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloaking locations for anonymous location based services: a hybrid approach., and . GeoInformatica, 13 (2): 159-182 (2009)Querying geospatial data streams in SECONDO., , and . GIS, page 544-545. ACM, (2009)A natural language interface for crime-related spatial queries., , , and . ISI, page 164-166. IEEE, (2009)Dynamic Statistics Collection in the Teradata Unified Data Architecture., , , , , and . ICDE, page 255-258. IEEE Computer Society, (2017)Cluster-By: An Efficient Clustering Operator in Emergency Management Database Systems., , and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 152-164. Springer, (2013)On the Relationships between Clustering and Spatial Co-Location Pattern Mining., , and . Int. J. Artif. Intell. Tools, 17 (1): 55-70 (2008)Integration of wireless sensor networks in environmental monitoring cyber infrastructure., , , , , and . Wirel. Networks, 16 (4): 1091-1108 (2010)ChatTraffic: Text-to-Traffic Generation via Diffusion Model., , , , , , and . CoRR, (2023)LiDAR-Inertial 3D SLAM with Plane Constraint for Multi-story Building., , , , and . CoRR, (2022)Cluster By: a new sql extension for spatial data aggregation., and . GIS, page 53. ACM, (2007)