Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding Tree Structured Data and Queries from Untrusted Data Stores., and . Inf. Secur. J. A Glob. Perspect., 14 (4): 10-26 (2005)Collaborative multimedia documents: Authoring and presentation., , and . Int. J. Intell. Syst., 13 (12): 1059-1111 (1998)Discovering mappings in hierarchical data from multiple sources using the inherent structure., , , and . Knowl. Inf. Syst., 10 (2): 185-210 (2006)Locality-sensitive and Re-use Promoting Personalized PageRank computations., , and . Knowl. Inf. Syst., 47 (2): 261-299 (2016)Matrix Factorization with Interval-Valued Data., , , and . IEEE Trans. Knowl. Data Eng., 33 (4): 1644-1658 (2021)Domain Generalization - A Causal Perspective., , , , and . CoRR, (2022)DataStorm-FE: A Data- and Decision-Flow and Coordination Engine for Coupled Simulation Ensembles., , , , , and . Proc. VLDB Endow., 11 (12): 1906-1909 (2018)Narrative-based taxonomy distillation for effective indexing of text collections., , and . Data Knowl. Eng., (2012)SAN : Scale-Space Attention Networks., , and . ICDE, page 853-864. IEEE, (2020)Improving User Response Times in Application Delivery Networks through Reduction of Network and Server Latencies., , and . J. Interconnect. Networks, 8 (3): 181-208 (2007)