Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Between a Rock and a Cell Phone: Communication and Information Technology Use during the 2011 Uprisings in Tunisia and Egypt., , , , , , , and . Int. J. Inf. Syst. Crisis Response Manag., 5 (1): 1-21 (2013)Adaptive rank-aware query optimization in relational databases., , , , , and . ACM Trans. Database Syst., 31 (4): 1257-1304 (2006)A framework for testing query transformation rules., , and . SIGMOD Conference, page 257-268. ACM, (2009)Personalized Microblogs Corpus Recommendation Based on Dynamic Users Interests., , and . SocialCom, page 979-982. IEEE Computer Society, (2013)Real-time interactive time correction on the GPU., , , , and . SciVis, page 145-146. IEEE Computer Society, (2015)Secure Supply-Chain Protocols., , , and . CEC, page 293-302. IEEE Computer Society, (2003)Chameleon: Context-Awareness inside DBMSs., , and . ICDE, page 1335-1338. IEEE Computer Society, (2009)Query optimization for spatio-temporal data stream management systems.. SIGSPATIAL Special, 1 (1): 21-26 (2009)Curator: Enhancing Micro-Blogs Ranking by Exploiting User's Context., and . CICLing (2), volume 10762 of Lecture Notes in Computer Science, page 353-365. Springer, (2017)You Shall Know a Place by the Conversations it Seeds., , and . ASONAM, page 359-362. ACM, (2017)