Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthetic Graph Generation from Finely-Tuned Temporal Constraints., , and . TD-LSG@PKDD/ECML, volume 1929 of CEUR Workshop Proceedings, page 44-47. CEUR-WS.org, (2017)The iBench Integration Metadata Generator., , , and . Proc. VLDB Endow., 9 (3): 108-119 (2015)Gain Control over your Integration Evaluations., , , and . Proc. VLDB Endow., 8 (12): 1960-1963 (2015)Cross-Model Queries and Schemas: Complexity and Learning. (Requêtes et Schémas Hétérogènes : Complexité et Apprentissage).. Lille University of Science and Technology, France, (2015)Demonstration of GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation., and . ISWC (Demos/Industry), volume 2721 of CEUR Workshop Proceedings, page 1-6. CEUR-WS.org, (2020)Secure Outsourced Data Analytics. (Analyse Sécurisée de Données Externalisées).. (2021)Learning Join Queries from User Examples., , and . ACM Trans. Database Syst., 40 (4): 24:1-24:38 (2016)A Paradigm for Learning Queries on Big Data., , , and . Data4U@VLDB, page 7. ACM, (2014)Interactive Join Query Inference with JIM., , and . Proc. VLDB Endow., 7 (13): 1541-1544 (2014)Secure protocols for cumulative reward maximization in stochastic multi-armed bandits., , , and . J. Comput. Secur., 31 (1): 1-27 (2023)