Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interestingness and Pruning of Mined Patterns., , , and . 1999 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, (1999)Declarative Frameworks for Inheritance., and . Logics for Databases and Information Systems, page 357-388. Kluwer, (1998)EPIC: Welfare Maximization under Economically Postulated Independent Cascade Model., , and . CoRR, (2018)Modeling non-progressive phenomena for influence propagation., , , and . COSN, page 131-138. ACM, (2014)CELF++: optimizing the greedy algorithm for influence maximization in social networks., , and . WWW (Companion Volume), page 47-48. ACM, (2011)On Implementing SchemaLog - A Database Programming Language., , , and . CIKM, page 309-316. ACM, (1996)Expressive power of an algebra for data mining., , , and . ACM Trans. Database Syst., 31 (4): 1169-1214 (2006)View-Based Tree-Language Rewritings for XML., and . FoIKS, volume 8367 of Lecture Notes in Computer Science, page 270-289. Springer, (2014)Information Integration and the Semantic Web., and . IEEE Data Eng. Bull., 26 (4): 19-25 (2003)Efficient Secure Query Evaluation over Encrypted XML Databases., and . VLDB, page 127-138. ACM, (2006)