Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Reverse k Nearest Neighbor evaluation for hierarchical index., , and . CoRR, (2015)Efficient Enforcement of Privacy for Moving Object Trajectories., , and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 360-374. Springer, (2013)Efficient Quantum Agnostic Improper Learning of Decision Trees., , and . AISTATS, volume 238 of Proceedings of Machine Learning Research, page 514-522. PMLR, (2024)Efficient Universal Quantum Circuits., , , and . COCOON, volume 5609 of Lecture Notes in Computer Science, page 418-428. Springer, (2009)Quantum Query-Space Lower Bounds Using Branching Programs., and . CoRR, (2024)A Generalized Quantum Branching Program., and . FSTTCS, volume 284 of LIPIcs, page 31:1-31:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Small depth quantum circuits., , and . SIGACT News, 38 (2): 35-50 (2007)Mintra: Mining anonymized trajectories with annotations., , and . IDEAS, page 105-114. ACM, (2016)Preserving Location Privacy for Continuous Queries on Known Route., , , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 265-279. Springer, (2011)Amplitude Amplification for Operator Identification and Randomized Classes.. COCOON, volume 10976 of Lecture Notes in Computer Science, page 579-591. Springer, (2018)