Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ring-constrained join: deriving fair middleman locations from pointsets via a geometric constraint., , and . EDBT, volume 261 of ACM International Conference Proceeding Series, page 606-617. ACM, (2008)Delineating social network data anonymization via random edge perturbation., , , , and . CIKM, page 475-484. ACM, (2012)Scalable Indexing and Adaptive Querying of RDF Data in the cloud., , , , and . SWIM, page 39:1-39:8. ACM, (2014)Harvester: Influence Optimization in Symmetric Interaction Networks., and . DSAA, page 61-70. IEEE, (2016)Fast Data Anonymization with Low Information Loss., , , and . VLDB, page 758-769. ACM, (2007)MCWDST: a Minimum-Cost Weighted Directed Spanning Tree Algorithm for Real-Time Fake News Mitigation in Social Media., , , and . CoRR, (2023)GRASP: Graph Alignment Through Spectral Signatures., , , , , and . APWeb/WAIM (1), volume 12858 of Lecture Notes in Computer Science, page 44-52. Springer, (2021)k-Anonymization by Freeform Generalization., , , and . AsiaCCS, page 519-530. ACM, (2015)A Content Recommendation Policy for Gaining Subscribers., , , and . SIGIR, page 2501-2506. ACM, (2022)Finding Dense and Persistently Expansive Subgraphs., , and . WWW (Companion Volume), page 553-556. ACM, (2024)