Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding Tree Structured Data and Queries from Untrusted Data Stores., and . Inf. Secur. J. A Glob. Perspect., 14 (4): 10-26 (2005)Collaborative multimedia documents: Authoring and presentation., , and . Int. J. Intell. Syst., 13 (12): 1059-1111 (1998)Discovering mappings in hierarchical data from multiple sources using the inherent structure., , , and . Knowl. Inf. Syst., 10 (2): 185-210 (2006)Locality-sensitive and Re-use Promoting Personalized PageRank computations., , and . Knowl. Inf. Syst., 47 (2): 261-299 (2016)Improving User Response Times in Application Delivery Networks through Reduction of Network and Server Latencies., , and . J. Interconnect. Networks, 8 (3): 181-208 (2007)SAN : Scale-Space Attention Networks., , and . ICDE, page 853-864. IEEE, (2020)Pando: Efficient Byzantine-Tolerant Distributed Sensor Fusion using Forest Ensembles., and . ICC, page 1-6. IEEE, (2020)Secure and Privacy Preserving Outsourcing of Tree Structured Data., and . Secure Data Management, volume 3178 of Lecture Notes in Computer Science, page 1-17. Springer, (2004)Multimedia Data Querying., and . Encyclopedia of Database Systems, Springer US, (2009)Leveraging Structural Knowledge for Hierarchically-Informed Keyword Weight Propagation in the Web., and . WEBKDD, volume 4811 of Lecture Notes in Computer Science, page 72-91. Springer, (2006)