Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploratory mining and pruning optimizations of constrained associations rules, , , and . SIGMOD, page 13--24. (1998)Parametric Query Optimization., , , and . VLDB, page 103-114. Morgan Kaufmann, (1992)Integrating copy number polymorphisms into array CGH analysis using a robust HMM., , , , , , and . ISMB (Supplement of Bioinformatics), page 431-439. (2006)Finding Aggregate Proximity Relationships and Commonalities in Spatial Data Mining., and . IEEE Trans. Knowl. Data Eng., 8 (6): 884-897 (1996)Constraint-Based Multidimensional Data Mining., , and . Computer, 32 (8): 46-50 (1999)Computational Biomarker Pipeline from Discovery to Clinical Implementation: Plasma Proteomic Biomarkers for Cardiac Transplantation., , , , , , , , , and 7 other author(s). PLoS Comput. Biol., (2013)An Analysis of Buffer Sharing and Prefetching Techniques for Multimedia Systems., and . Multim. Syst., 4 (2): 55-69 (1996)Constraint-based clustering in large databases., , , and . ICDT, volume 1973 of Lecture Notes in Computer Science, page 405-419. Springer, (2001)Mixed Integer Programming Methods for Computing Nonmonotonic Deductive Databases., , , and . J. ACM, 41 (6): 1178-1215 (1994)Scalable discovery of hidden emails from large folders., , and . KDD, page 544-549. ACM, (2005)