Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploratory mining in cube space, and . Data Mining and Knowledge Discovery, 15 (1): 29--54 (August 2007)When Is "Nearest Neighbor" Meaningful?, , , and . In Int. Conf. on Database Theory, page 217--235. (1999)DEMON--Data Evolution and Monitoring, , and . (2000)Scalable Integration of Data Collections on the Web, and . University of Wisconsin-Madison Department of Computer Sciences, (1998)Logical Query Optimization by Proff-Tree Transformation., , , and . J. Comput. Syst. Sci., 47 (1): 222-248 (1993)Proof-Tree Transformation Theorems and Their Applications., , , and . PODS, page 172-181. ACM Press, (1989)Cloudy with high chance of DBMS: a 10-year prediction for Enterprise-Grade ML., , , , , , , , , and 12 other author(s). CIDR, www.cidrdb.org, (2020)Setting Realistic Think Times in Performance Testing: A Practitioner's Approach., , and . ISEC, page 157-164. ACM, (2017)The EDAM project: mining mass spectra and more.. CIKM, page 1. ACM, (2004)Hydra: a federated resource manager for data-center scale analytics., , , , , , , , , and 5 other author(s). NSDI, page 177-192. USENIX Association, (2019)