From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A diagnostic approach to repairing constraint violations in databases, , и . Proceedings of the Sixth International Workshop on Principles of Diagnosis (DX`95), стр. 65-72. Goslar, Germany, (1995)Terms in Time and Times in Context: A Graph-based Term-Time Ranking Model, , , и . Proceedings of the 24th International Conference on World Wide Web, стр. 1375--1380. New York, NY, USA, ACM, (2015)CODY: A graph-based framework for the analysis of COnversation DYnamics in online social networks., , и . CoRR, (2023)Topical Change Detection in Documents via Embeddings of Long Sequences., , , и . CoRR, (2020)Exploring Entity-centric Networks in Entangled News Streams., и . WWW (Companion Volume), стр. 555-563. ACM, (2018)"Temporal" Integrity Constraints in Temporal Databases, и . Temporal Databases, стр. 77-92. Springer, (1995)Flexible authentication of XML documents., , , , , и . CCS, стр. 136-145. ACM, (2001)Modeling and Querying Vague Spatial Objects Using Shapelets., , и . VLDB, стр. 567-578. ACM, (2007)Modeling satellite image streams for change analysis., и . GIS, стр. 7. ACM, (2007)Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs., , , , и . DIMVA, том 4064 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2006)