Author of the publication

A Discussion on the Design of Graph Database Benchmarks.

, , , , and . TPCTC, volume 6417 of Lecture Notes in Computer Science, page 25-40. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deep-Reinforcement Learning Approach for Software-Defined Networking Routing Optimization., , , , and . CoRR, (2017)Improving Quality and Convergence of Genetic Query Optimizers., , , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 6-17. Springer, (2007)Improving Process Model Precision by Loop Unrolling., , , and . SIMPDA, volume 1757 of CEUR Workshop Proceedings, page 89-99. CEUR-WS.org, (2016)Mining Dependencies in Large-Scale Agile Software Development Projects: A Quantitative Industry Study., , and . EASE, page 20-29. ACM, (2021)Crowdsourcing for Industrial Problems., , , , , and . CitiSens, volume 7685 of Lecture Notes in Computer Science, page 6-18. Springer, (2012)Provenance and Privacy., , , and . MDAI, volume 10571 of Lecture Notes in Computer Science, page 3-11. Springer, (2017)Semantic blocking for Record Linkage., , , and . CCIA, volume 163 of Frontiers in Artificial Intelligence and Applications, page 141-149. IOS Press, (2007)Exploiting pipeline interruptions for efficient memory allocation., , , and . CIKM, page 639-648. ACM, (2008)Dex: high-performance exploration on large graphs for information retrieval., , , , , and . CIKM, page 573-582. ACM, (2007)Increasing Polynomial Regression Complexity for Data Anonymization., , , , and . IPC, page 29-34. IEEE Computer Society, (2007)