Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Improving Data Skew Resilience In Main-memory Hash Joins., , and . IDEAS, page 226-235. ACM, (2018)Realistic Mobility for Mobile Ad Hoc Network Simulation., , and . ADHOC-NOW, volume 3158 of Lecture Notes in Computer Science, page 324-329. Springer, (2004)Internet of Things (IoT) security dataset evolution: Challenges and future directions., , , , , , , , and . Internet Things, (July 2023)Data Provenance in Security and Privacy., , and . ACM Comput. Surv., 55 (14s): 323:1-323:35 (2023)De-anonymizing Ethereum blockchain smart contracts through code attribution., , and . Int. J. Netw. Manag., (2021)SOREL: Efficient and Secure ORE-Based Range Query Over Outsourced Data., , and . IEEE Trans. Big Data, 8 (6): 1702-1715 (2022)DISTIL: a distributed in-memory data processing system for location-based services., , , , , , and . SIGSPATIAL/GIS, page 496-499. ACM, (2018)SPRIG: A Learned Spatial Index for Range and kNN Queries., , , and . SSTD, page 96-105. ACM, (2021)Scalable Local Short-Term Energy Consumption Forecasting., , and . CCECE, page 1-6. IEEE, (2019)FunDa: Towards Serverless Data Analytics and In Situ Query Processing., , , and . BiDEDE@SIGMOD, page 2:1-2:6. ACM, (2024)