Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PassApp: My App is My Password!, , , , and . MobileHCI, page 306-315. ACM, (2015)Scalable sequential pattern mining for biological sequences., , and . CIKM, page 178-187. ACM, (2004)Data Mining for Inventory Item Selection with Cross-Selling Considerations., , and . Data Min. Knowl. Discov., 11 (1): 81-112 (2005)Time-Dependent Behavior of a Circular Symmetrical Tunnel Supported with Rockbolts., , , , and . Symmetry, 10 (9): 381 (2018)New Methods for Handling Singular Sample Covariance Matrices, and . CoRR, (2011)On the On-Line Weighted k-Taxi Problem., and . ESCAPE, volume 4614 of Lecture Notes in Computer Science, page 152-162. Springer, (2007)Incremental Database Design Revisited., and . ICCI, volume 497 of Lecture Notes in Computer Science, page 219-230. Springer, (1991)Some Positive Results for Boundedness of Multiple Recursive Rules.. ICDT, volume 893 of Lecture Notes in Computer Science, page 383-396. Springer, (1995)On the On-Line k -Taxi Problem with Limited Look Ahead., , and . COCOA, volume 4616 of Lecture Notes in Computer Science, page 72-80. Springer, (2007)Profit Mining: From Patterns to Actions., , and . EDBT, volume 2287 of Lecture Notes in Computer Science, page 70-87. Springer, (2002)