Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncertain Deductive Databases: A Hybrid Approach., and . Inf. Syst., 22 (8): 483-508 (1997)Interestingness and Pruning of Mined Patterns., , , and . 1999 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, (1999)Information Integration and the Semantic Web., and . IEEE Data Eng. Bull., 26 (4): 19-25 (2003)Efficient Secure Query Evaluation over Encrypted XML Databases., and . VLDB, page 127-138. ACM, (2006)Generating Top-k Packages via Preference Elicitation., , and . Proc. VLDB Endow., 7 (14): 1941-1952 (2014)A Data-Based Approach to Social Influence Maximization., , and . Proc. VLDB Endow., 5 (1): 73-84 (2011)Exploiting Conflict Structures in Inconsistent Databases., and . ADBIS, volume 6295 of Lecture Notes in Computer Science, page 320-335. Springer, (2010)View-Based Tree-Language Rewritings for XML., and . FoIKS, volume 8367 of Lecture Notes in Computer Science, page 270-289. Springer, (2014)Cohort Representation and Exploration., , and . DSAA, page 169-178. IEEE, (2018)HeteroMF: recommendation in heterogeneous information networks using context dependent factor models., and . WWW, page 643-654. International World Wide Web Conferences Steering Committee / ACM, (2013)