Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Data Management (Dagstuhl Seminar 12171)., , , , , , , , , and . Dagstuhl reports, 2 (4): 39--65 (2012)Efficient Streaming Subgraph Isomorphism with Graph Neural Networks., , , , , and . Proc. VLDB Endow., 14 (5): 730-742 (2021)Handling probabilistic integrity constraints in pay-as-you-go reconciliation of data models., , , , , , and . Inf. Syst., (2019)PicShark: mitigating metadata scarcity through large-scale P2P collaboration., , , and . VLDB J., 17 (6): 1371-1384 (2008)Efficient Interest Group Discovery in Social Networks using an Integrated Structure/Quality Index., , and . BTW, volume P-180 of LNI, page 367-378. GI, (2011)Memo-it: don't write your diary, sense it., , , , , , , , , and 2 other author(s). UbiComp Adjunct, page 203-206. ACM, (2014)ALVIS peers: a scalable full-text peer-to-peer retrieval engine., , , , and . P2PIR@CIKM, page 41-48. ACM, (2006)Computational Trust Models., , and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Tunable privacy for access controlled data in peer-to-peer systems., , , and . ITC, page 1-8. IEEE, (2010)A Peer-to-Peer Architecture for Information Retrieval Across Digital Library Collections., , , , and . ECDL, volume 4172 of Lecture Notes in Computer Science, page 14-25. Springer, (2006)