Author of the publication

Exploiting Local Similarity for Indexing Paths in Graph-Structured Data.

, , , and . ICDE, page 129-140. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Oblivious Query Processing., and . CoRR, (2013)Engineering Security and Performance with Cipherbase., , , , , , , , and . IEEE Data Eng. Bull., 35 (4): 65-72 (2012)Synopses for Query Optimization: A Space-Complexity Perspective., , and . PODS, page 201-209. ACM, (2004)SQL Ledger: Cryptographically Verifiable Data in Azure SQL Database., , , , , , and . SIGMOD Conference, page 2437-2449. ACM, (2021)Data generation using declarative constraints., , and . SIGMOD Conference, page 685-696. ACM, (2011)A grammar-based entity representation framework for data cleaning., and . SIGMOD Conference, page 233-244. ACM, (2009)Azure SQL Database Always Encrypted., , , , , , , , , and 6 other author(s). SIGMOD Conference, page 1511-1525. ACM, (2020)Raising Authorization Awareness in a DBMS., , and . CIDR, www.cidrdb.org, (2015)Querying encrypted data., , , and . ICDE, page 1262-1263. IEEE Computer Society, (2013)Recursive XML Schemas, Recursive XML Queries, and Relational Storage: XML-to-SQL Query Translation., , , and . ICDE, page 42-53. IEEE Computer Society, (2004)