Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Isomorphism Conjecture for 2-DFA Reductions., and . Int. J. Found. Comput. Sci., 7 (4): 339-352 (1996)k-Attribute-Anonymity is hard even for k=2., , and . Inf. Process. Lett., 115 (2): 368-370 (2015)A knowledge based framework for developing and customizing schedulers., and . KBSE, page 69-76. IEEE Computer Society, (1993)The Best Answers? Think Twice: Online Detection of Commercial Campaigns in the CQA Forums, , , and . CoRR, (2012)Battling the Internet Water Army: Detection of Hidden Paid Posters, , , and . CoRR, (2011)Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts codes., , and . Des. Codes Cryptogr., 86 (9): 1893-1904 (2018)Visibly Pushdown Transducers for Approximate Validation of Streaming XML., , and . FoIKS, volume 4932 of Lecture Notes in Computer Science, page 219-238. Springer, (2008)Recovery of Class Hierarchies and Composition Relationships from Machine Code., and . CC, volume 8409 of Lecture Notes in Computer Science, page 61-84. Springer, (2014)Model-assisted machine-code synthesis., , and . Proc. ACM Program. Lang., 1 (OOPSLA): 61:1-61:26 (2017)Scaling Up Structural Clustering to Large Probabilistic Graphs Using Lyapunov Central Limit Theorem., , and . Proc. VLDB Endow., 16 (11): 3165-3177 (2023)