Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Category-Based Infidelity Bounded Queries over Unstructured Data Streams., and . IEEE Trans. Knowl. Data Eng., 25 (11): 2448-2462 (2013)D'MART: A Tool for Building and Populating Data Warehouse Model from Existing Reports and Tables., , , , and . WAIM, volume 7418 of Lecture Notes in Computer Science, page 102-113. Springer, (2012)Adaptive Push-Pull: Disseminating Dynamic Web Data., , , , , and . IEEE Trans. Computers, 51 (6): 652-668 (2002)Optimal Deployment of Triggers for Detecting Events., , , and . DEXA, volume 3180 of Lecture Notes in Computer Science, page 66-76. Springer, (2004)Towards Bringing Database Management Task in the Realm of IT non-Experts., , and . ICDE, page 832-839. IEEE Computer Society, (2003)Enhanced Business Intelligence using EROCS., , , , , , , , and . ICDE, page 1616-1619. IEEE Computer Society, (2008)New trends in information integration., and . ICUIMC, page 74-81. ACM, (2008)A Generic XACML Based Declarative Authorization Scheme for Java., and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 44-63. Springer, (2005)Bias Mitigation Post-processing for Individual and Group Fairness., , , , , and . CoRR, (2018)XPEDIA: XML ProcEssing for Data IntegrAtion., , , , , and . Proc. VLDB Endow., 2 (2): 1330-1341 (2009)