Author of the publication

Proximity Search of XML Data Using Ontology and XPath Edit Similarity.

, , and . DEXA, volume 4653 of Lecture Notes in Computer Science, page 298-307. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path-based keyword search over XML streams., , and . Int. J. Web Inf. Syst., 11 (3): 347-369 (2015)Parallel holistic twig joins on a multi-core system., , and . Int. J. Web Inf. Syst., 6 (2): 149-177 (2010)A Path-based Relational RDF Database., , , and . ADC, volume 39 of CRPIT, page 95-103. Australian Computer Society, (2005)Interval-Based Representation of Spatio-Temporal Concepts., , , and . CAiSE, volume 1250 of Lecture Notes in Computer Science, page 231-244. Springer, (1997)GPU-Accelerated Graph Clustering via Parallel Label Propagation., , and . CIKM, page 567-576. ACM, (2017)Supporting Insertion in an Encrypted Multi-Maps with Volume Hiding using Trusted Execution Environment., , and . DOLAP, volume 3130 of CEUR Workshop Proceedings, page 61-70. CEUR-WS.org, (2022)Dense Nearest Neighborhood Query., , , and . INTAP, volume 1616 of Communications in Computer and Information Science, page 3-16. Springer, (2021)Integration of Knowledge Bases and External Information Sources via Magic Properties and Query-Driven Entity Linking., , , and . iiWAS, volume 14416 of Lecture Notes in Computer Science, page 309-324. Springer, (2023)RDF Data Partitioning for Efficient SPARQL Query Processing with Spark SQL., and . iiWAS, volume 14416 of Lecture Notes in Computer Science, page 92-106. Springer, (2023)A Novel Framework for Database Security Based on Mixed Cryptography., , and . ICIW, page 163-170. IEEE Computer Society, (2009)