Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Turbo-charging Vertical Mining of Large Databases., , , , , and . SIGMOD Conference, page 22-33. ACM, (2000)SIGMOD Record 29(2), June 2000.Vision Paper: Enabling Privacy for the Paranoids., , , , , , , , , and 1 other author(s). VLDB, page 708-719. Morgan Kaufmann, (2004)Two Can Keep A Secret: A Distributed Architecture for Secure Database Services., , , , , , , , and . CIDR, page 186-199. www.cidrdb.org, (2005)Transience of peers & streaming media., , and . Comput. Commun. Rev., 33 (1): 107-112 (2003)Minimizing View Sets without Losing Query-Answering Power., , and . ICDT, volume 1973 of Lecture Notes in Computer Science, page 99-113. Springer, (2001)Symphony: Distributed Hashing in a Small World., , and . USENIX Symposium on Internet Technologies and Systems, USENIX, (2003)Privacy-preserving indexing of documents on the network., , , and . VLDB J., 18 (4): 837-856 (2009)The Price of Validity in Dynamic Networks., , , and . SIGMOD Conference, page 515-526. ACM, (2004)SETS: search enhanced by topic segmentation., , and . SIGIR, page 306-313. ACM, (2003)Authenticity and availability in PIPE networks., , , , and . Future Gener. Comput. Syst., 21 (3): 391-400 (2005)