Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Curating Databases., , , , , , and . EDBT, page 467-472. OpenProceedings.org, (2016)Incremental Frequent Subgraph Mining on Large Evolving Graphs., , , , , and . IEEE Trans. Knowl. Data Eng., 29 (12): 2710-2723 (2017)Uncheatable Machine Learning Inference., , and . CoRR, (2019)Incremental Frequent Subgraph Mining on Large Evolving Graphs., , , , , and . ICDE, page 1767-1768. IEEE Computer Society, (2018)Secure multidimensional range queries over outsourced data., , , and . VLDB J., 21 (3): 333-358 (2012)L-Store: A Real-time OLTP and OLAP System., , , and . CoRR, (2016)Design and Analysis of Querying Encrypted Data in Relational Databases., and . DBSec, volume 4602 of Lecture Notes in Computer Science, page 177-194. Springer, (2007)Storage Class Memory Aware Data Management., , , , and . IEEE Data Eng. Bull., 33 (4): 35-40 (2010)Buffered Bloom Filters on Solid State Storage., , , , and . ADMS@VLDB, page 1-8. (2010)Building Disclosure Risk Aware Query Optimizers for Relational Databases., , , and . PVLDB, 3 (1): 13-24 (2010)