Author of the publication

A Hierarchical Clustering Algorithm for Characterizing Social Media Users.

, , , and . WWW (Companion Volume), page 353-362. ACM / IW3C2, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Anonymity., and . PinKDD, volume 4890 of Lecture Notes in Computer Science, page 56-79. Springer, (2007)Operator scheduling in data stream systems., , , , and . VLDB J., 13 (4): 333-353 (2004)Anonymizing Tables., , , , , , and . ICDT, volume 3363 of Lecture Notes in Computer Science, page 246-258. Springer, (2005)A Hierarchical Clustering Algorithm for Characterizing Social Media Users., , , and . WWW (Companion Volume), page 353-362. ACM / IW3C2, (2020)Architecting the Database Access for a IT Infrastructure and Data Center Monitoring Tool., , , , , , , , , and . ICDE Workshops, page 351-354. IEEE Computer Society, (2012)Auditing SQL Queries., , and . ICDE, page 287-296. IEEE Computer Society, (2008)Distributing data for secure database services., , , , and . PAIS, page 8. ACM, (2011)Scheduling and Caching in MultiQuery Optimization., , and . COMAD, page 150-153. Tata McGraw-Hill Publishing Company Limited, (2006)Excel Solvers for the Traveling Salesman Problem., , and . COMAD, page 103-107. Computer Society of India, (2012)Data Privacy Using MASKETEERTM., , , , and . ICTAC, volume 7521 of Lecture Notes in Computer Science, page 151-158. Springer, (2012)