<?xml version="1.0"?>
<dblpperson name="Wai Lup Low" pid="97/5873" n="7">
<person key="homepages/97/5873" mdate="2009-06-10">
<author pid="97/5873">Wai Lup Low</author>
</person>
<r><inproceedings key="conf/edbt/LeeLL02" mdate="2017-05-21">
<author pid="l/MongLiLee">Mong-Li Lee</author>
<author pid="l/TokWangLing">Tok Wang Ling</author>
<author pid="97/5873">Wai Lup Low</author>
<title>Designing Functional Dependencies for XML.</title>
<pages>124-141</pages>
<year>2002</year>
<crossref>conf/edbt/2002</crossref>
<booktitle>EDBT</booktitle>
<ee>https://doi.org/10.1007/3-540-45876-X_10</ee>
<url>db/conf/edbt/edbt2002.html#LeeLL02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/LeeLW02" mdate="2017-05-23">
<author pid="04/1907">Sin Yeung Lee</author>
<author pid="97/5873">Wai Lup Low</author>
<author pid="90/3088">Pei Yuen Wong</author>
<title>Learning Fingerprints for a Database Intrusion Detection System.</title>
<pages>264-280</pages>
<year>2002</year>
<crossref>conf/esorics/2002</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-45853-0_16</ee>
<url>db/conf/esorics/esorics2002.html#LeeLW02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/LowTLL02" mdate="2023-03-24">
<author pid="97/5873">Wai Lup Low</author>
<author orcid="0000-0001-8346-5003" pid="t/WHTok">Wee Hyong Tok</author>
<author orcid="0000-0002-9636-388X" pid="l/MongLiLee">Mong-Li Lee</author>
<author pid="l/TokWangLing">Tok Wang Ling</author>
<title>Data Cleaning and XML: The DBLP Experience.</title>
<pages>269</pages>
<year>2002</year>
<crossref>conf/icde/2002</crossref>
<booktitle>ICDE</booktitle>
<ee>https://doi.org/10.1109/ICDE.2002.994723</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDE.2002.994723</ee>
<url>db/conf/icde/icde2002.html#LowTLL02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/TokOLAB02" mdate="2023-03-24">
<author orcid="0000-0001-8346-5003" pid="t/WHTok">Wee Hyong Tok</author>
<author pid="70/426">Twee-Hee Ong</author>
<author pid="97/5873">Wai Lup Low</author>
<author orcid="0000-0002-8338-3734" pid="55/6132">Indriyati Atmosukarto</author>
<author pid="b/SBressan">St&#233;phane Bressan</author>
<title>Predator-Miner: Ad hoc Mining of Associations Rules within a Database Management System.</title>
<pages>327-328</pages>
<year>2002</year>
<crossref>conf/icde/2002</crossref>
<booktitle>ICDE</booktitle>
<ee>https://doi.org/10.1109/ICDE.2002.994741</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDE.2002.994741</ee>
<url>db/conf/icde/icde2002.html#TokOLAB02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iceis/LowLT02" mdate="2017-02-02">
<author pid="97/5873">Wai Lup Low</author>
<author pid="61/2183">Joseph Lee</author>
<author pid="53/1238">Peter Teoh</author>
<title>DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions.</title>
<pages>121-128</pages>
<year>2002</year>
<crossref>conf/iceis/2002</crossref>
<booktitle>ICEIS</booktitle>
<url>db/conf/iceis/iceis2002.html#LowLT02</url>
</inproceedings>
</r>
<r><article key="journals/is/LowLL01" mdate="2018-11-02">
<author pid="97/5873">Wai Lup Low</author>
<author orcid="0000-0002-9636-388X" pid="l/MongLiLee">Mong-Li Lee</author>
<author pid="l/TokWangLing">Tok Wang Ling</author>
<title>A knowledge-based approach for duplicate elimination in data cleaning.</title>
<pages>585-606</pages>
<year>2001</year>
<volume>26</volume>
<journal>Inf. Syst.</journal>
<number>8</number>
<url>db/journals/is/is26.html#LowLL01</url>
<ee>https://doi.org/10.1016/S0306-4379(01)00041-2</ee>
</article>
</r>
<r><inproceedings key="conf/kdd/LeeLL00" mdate="2018-11-06">
<author pid="l/MongLiLee">Mong-Li Lee</author>
<author pid="l/TokWangLing">Tok Wang Ling</author>
<author pid="97/5873">Wai Lup Low</author>
<title>IntelliClean: a knowledge-based intelligent data cleaner.</title>
<pages>290-294</pages>
<year>2000</year>
<crossref>conf/kdd/2000</crossref>
<booktitle>KDD</booktitle>
<ee>https://doi.org/10.1145/347090.347154</ee>
<url>db/conf/kdd/kdd2000.html#LeeLL00</url>
</inproceedings>
</r>
<coauthors n="10" nc="2">
<co c="0"><na f="a/Atmosukarto:Indriyati" pid="55/6132">Indriyati Atmosukarto</na></co>
<co c="0"><na f="b/Bressan:St=eacute=phane" pid="b/SBressan">St&#233;phane Bressan</na></co>
<co c="1"><na f="l/Lee:Joseph" pid="61/2183">Joseph Lee</na></co>
<co c="0"><na f="l/Lee:Mong=Li" pid="l/MongLiLee">Mong-Li Lee</na></co>
<co c="0"><na f="l/Lee:Sin_Yeung" pid="04/1907">Sin Yeung Lee</na></co>
<co c="0"><na f="l/Ling:Tok_Wang" pid="l/TokWangLing">Tok Wang Ling</na></co>
<co c="0"><na f="o/Ong:Twee=Hee" pid="70/426">Twee-Hee Ong</na></co>
<co c="1"><na f="t/Teoh:Peter" pid="53/1238">Peter Teoh</na></co>
<co c="0"><na f="t/Tok:Wee_Hyong" pid="t/WHTok">Wee Hyong Tok</na></co>
<co c="0"><na f="w/Wong:Pei_Yuen" pid="90/3088">Pei Yuen Wong</na></co>
</coauthors>
</dblpperson>

