Author of the publication

Optimizing Cloud Data Lake Queries With a Balanced Coverage Plan.

, , , and . IEEE Trans. Cloud Comput., 12 (1): 84-99 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alter-egos and Roles: Supporting Workflow Security in Cyberspaces., , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 182-195. Chapman & Hall, (1997)An Object-Oriented Database Architecture for Providing Securty in Cyberspace., and . DBSec, volume 79 of IFIP Conference Proceedings, page 120-144. Chapman & Hall, (1996)Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis., , and . VLDB J., 8 (2): 79-100 (1999)An Extended Entity-Relationship Model with Multi Level External Views., , and . ER, page 455-472. North-Holland, (1981)Combining rules and constraints for employee timetabling., , and . Int. J. Intell. Syst., 12 (6): 419-439 (1997)TOPS: a new design for transactions in publish/subscribe middleware., and . DEBS, volume 332 of ACM International Conference Proceeding Series, page 201-210. ACM, (2008)FlexiMine - A Flexible Platform for KDD Research and Application Development., , , , , , and . Ann. Math. Artif. Intell., 39 (1-2): 175-204 (2003)A Distributed Framework for the Detection of New Worm-Related Malware., , and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 179-190. Springer, (2008)Probabilistic model for schema understanding and matching., , and . SMC (5), page 4768-4773. IEEE, (2004)Storage Allocation for Access Path Minimization in Network Structured Data Bases., , and . JCDKB, page 319-. Academic Press, (1978)