Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing on data streams, , and . Dimacs Series In Discrete Mathematics And Theoretical Computer Science, (1999)External Memory Algorithms, , and . External Memory Algorithms, volume 50 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, chapter Computing on Data Streams, American Mathematical Society, Boston, MA, USA, (1999)Viewing the Web as a Graph: Structure and Interpretation.. WOWS, page 1. (1999)Designing LDPC codes using bit-filling., , and . ICC, page 55-59. IEEE, (2001)Self-similarity in the web., , , , , and . ACM Trans. Internet Techn., 2 (3): 205-223 (2002)Template detection via data mining and its applications., and . WWW, page 580-591. ACM, (2002)Trawling the Web for emerging cyber-communities, , , and . Proceedings of the eighth international conference on World Wide Web, page 1481--1493. New York, NY, USA, Elsevier North-Holland, Inc., (1999)The Web as a Graph., , , , , and . PODS, page 1-10. ACM, (2000)Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud Detection., , , , , , , , and . TrustCom/BigDataSE, page 1070-1078. IEEE, (2018)Verifying Identities (extended abstract)., and . FOCS, page 612-616. IEEE Computer Society, (1996)