Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph structure in the Web: Experiments and models, , , , , , , and . Proceedings of the Ninth Conference on World Wide Web, page 309--320. Amsterdam, Netherlands, ACM Press, (May 2000)Propagation of Trust and Distrust, , , and . Proceedings of the Thirteenth International World Wide Web Conference (WWW2004), page 403--412. ACM, ACM, (May 2004)The hiring problem and Lake Wobegon strategies., , , , , and . SODA, page 1184-1193. SIAM, (2008)A sparse Johnson: Lindenstrauss transform, , and . STOC, page 341-350. ACM, (2010)Topic Distillation and Spectral Filtering., , , , , , and . Artif. Intell. Rev., 13 (5-6): 409-435 (1999)On Semi-Automated Web Taxonomy Construction., , , and . WebDB, page 91-96. (2001)Big Data., and . Computer, 49 (4): 20-22 (2016)The Web and Social Networks., , , and . Computer, 35 (11): 32-36 (2002)"I know what you did last summer": query logs and user privacy., , , and . CIKM, page 909-914. ACM, (2007)Vanity fair: privacy in querylog bundles., , , and . CIKM, page 853-862. ACM, (2008)