Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Secure Query Evaluation over Encrypted XML Databases., and . VLDB, page 127-138. ACM, (2006)Deductive Databases with Incomplete Information., and . JICSLP, page 303-317. MIT Press, (1992)On Efficient Recommendations for Online Exchange Markets., and . ICDE, page 712-723. IEEE Computer Society, (2009)Report on the Third International Workshop on Exploratory Search in Databases and the Web (ExploreDB 2016)., , , , and . SIGMOD Record, 45 (3): 35-38 (2016)Logic in databases: report on the LID 2008 workshop., , and . SIGMOD Record, 38 (3): 44-49 (2009)Cohort Representation and Exploration., , and . DSAA, page 169-178. IEEE, (2018)SIMPATH: An Efficient Algorithm for Influence Maximization under the Linear Threshold Model., , and . ICDM, page 211-220. IEEE Computer Society, (2011)HeteroMF: recommendation in heterogeneous information networks using context dependent factor models., and . WWW, page 643-654. International World Wide Web Conferences Steering Committee / ACM, (2013)Exploring Rated Datasets with Rating Maps., , , , and . WWW, page 1411-1419. ACM, (2017)EPIC: Welfare Maximization under Economically Postulated Independent Cascade Model., , and . CoRR, (2018)