Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Operator scheduling in data stream systems., , , , and . VLDB J., 13 (4): 333-353 (2004)Anonymizing Tables., , , , , , and . ICDT, volume 3363 of Lecture Notes in Computer Science, page 246-258. Springer, (2005)A Hierarchical Clustering Algorithm for Characterizing Social Media Users., , , and . WWW (Companion Volume), page 353-362. ACM / IW3C2, (2020)Probabilistic Anonymity., and . PinKDD, volume 4890 of Lecture Notes in Computer Science, page 56-79. Springer, (2007)Architecting the Database Access for a IT Infrastructure and Data Center Monitoring Tool., , , , , , , , , and . ICDE Workshops, page 351-354. IEEE Computer Society, (2012)Auditing SQL Queries., , and . ICDE, page 287-296. IEEE Computer Society, (2008)Scheduling and Caching in MultiQuery Optimization., , and . COMAD, page 150-153. Tata McGraw-Hill Publishing Company Limited, (2006)Distributing data for secure database services., , , , and . PAIS, page 8. ACM, (2011)Excel Solvers for the Traveling Salesman Problem., , and . COMAD, page 103-107. Computer Society of India, (2012)Caching queues in memory buffers., and . SODA, page 541-549. SIAM, (2004)