Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracing Lineage Beyond Relational Operators., , , and . VLDB, page 1116-1127. ACM, (2007)Multiquality Data Replication in Multimedia Databases., , , and . IEEE Trans. Knowl. Data Eng., 19 (5): 679-694 (2007)Rights Protection for Categorical Data., , and . IEEE Trans. Knowl. Data Eng., 17 (7): 912-926 (2005)Query Indexing and Velocity Constrained Indexing: Scalable Techniques for Continuous Queries on Moving Objects., , , , and . IEEE Trans. Computers, 51 (10): 1124-1140 (2002)Optimal Scheduling Algorithms for Tertiary Storage., , and . Distributed and Parallel Databases, 14 (3): 255-282 (2003)Control-Based Load Shedding in Data Stream Management Systems., and . ICDE Workshops, page 144. IEEE Computer Society, (2006)Guaranteed authenticity and integrity of data from untrusted servers., and . ICDE, page 1282-1285. IEEE Computer Society, (2014)Scheduling Tertiary I/O in Database Applications., , , and . DEXA Workshop, page 722-727. IEEE Computer Society, (1997)Resilient Information Hiding for Abstract Semi-structures., , and . IWDW, volume 2939 of Lecture Notes in Computer Science, page 141-153. Springer, (2003)LIMO: learning programming using interactive map activities., , , , , and . SIGSPATIAL/GIS, page 98:1-98:4. ACM, (2015)