Author of the publication

Incremental Computation and Maintenance of Temporal Aggregates.

, and . ICDE, page 51-60. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Optimization of Diversified Community Prevention of COVID-19 Using Traditional Chinese Medicine., , , , , , and . IEEE Comput. Intell. Mag., 15 (4): 62-73 (2020)Generic Stacked BMS Using Low-side MOSFET Control Architecture., , , , , , and . ICCE-Taiwan, page 181-182. IEEE, (2023)Welding seam detection and feature point extraction for robotic arc welding using laser-vision., , , , and . URAI, page 644-647. IEEE, (2016)Supercongruences involving Apéry-like sequences mnGn(x) and mnVn(x)., and . Period. Math. Hung., 87 (2): 303-314 (December 2023)A path-planning algorithm of the automatic welding robot system for three-dimensional arc welding using image processing., , , and . URAI, page 692-697. IEEE, (2016)Dual delay-partitioning approach to stability analysis of generalized neural networks with interval time-varying delay., , , and . Neurocomputing, (2016)NV-Dedup: High-Performance Inline Deduplication for Non-Volatile Memory., , , , , and . IEEE Trans. Computers, 67 (5): 658-671 (2018)Content-based retrieval of FlashTM movies: research issues, generic framework, and future directions., , , and . Multimedia Tools Appl., 34 (1): 1-23 (2007)Probing the orientation of inhibitor and epoxy-eicosatrienoic acid binding in the active site of soluble epoxide hydrolase, , , , , , , , and . Archives of Biochemistry and Biophysics, (2017)Locating Compromised Sensor Nodes Through Incremental Hashing Authentication., , , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 321-337. Springer, (2006)