From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Computation of k-Medians over Data Streams Under Memory Constraints., , , , , и . J. Comput. Sci. Technol., 21 (2): 284-296 (2006)Evaluation of RDF queries via equivalence., , , , и . Frontiers Comput. Sci., 7 (1): 20-33 (2013)HilAnchor: Location Privacy Protection in the Presence of Users' Preferences., , и . J. Comput. Sci. Technol., 27 (2): 413-427 (2012)RDF pattern matching using sortable views., , , , , и . CIKM, стр. 315-324. ACM, (2012)Location Privacy Protection in the Presence of Users' Preferences., , , , и . WAIM, том 6897 из Lecture Notes in Computer Science, стр. 340-352. Springer, (2011)Attention Based Subgraph Classification for Link Prediction by Network Re-weighting., , , , , и . CIKM, стр. 3171-3175. ACM, (2021)Dynamic Network Embedding by Time-Relaxed Temporal Random Walk., , , и . ICONIP (1), том 13108 из Lecture Notes in Computer Science, стр. 426-437. Springer, (2021)A false negative approach to mining frequent itemsets from high speed transactional data streams., , , , и . Inf. Sci., 176 (14): 1986-2015 (2006)False-Negative Frequent Items Mining from Data Streams with Bursting., , , , и . DASFAA, том 3453 из Lecture Notes in Computer Science, стр. 422-434. Springer, (2005)Approximate K-Median of Location Streams with Redundancy and Inconsistency., , , , , и . Int. J. Softw. Informatics, 4 (2): 165-182 (2010)