Author of the publication

Answering Constrained k-NN Queries in Unstructured P2P Systems.

, , , , , , and . DBISP2P, volume 4125 of Lecture Notes in Computer Science, page 397-405. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tibetan Plateau serves as a water tower., , and . IGARSS, page 3120-3123. IEEE, (2005)A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory., , , and . J. Comput. Sci. Technol., 27 (1): 213-224 (2012)Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs., , , and . IEEE Trans. Knowl. Data Eng., 26 (5): 1117-1130 (2014)Query Intent Disambiguation of Keyword-Based Semantic Entity Search in Dataspaces., , , , and . J. Comput. Sci. Technol., 28 (2): 382-393 (2013)An Efficient Algorithm for Distributed Outlier Detection in Large Multi-Dimensional Datasets., , , , , and . J. Comput. Sci. Technol., 30 (6): 1233-1248 (2015)A genetic algorithm based entity resolution approach with active learning., , , , and . Frontiers Comput. Sci., 11 (1): 147-159 (2017)Modeling Enterprise Objects in a Virtual Enterprise Integrating System: VIASCOPE., , , and . ICSC, volume 1749 of Lecture Notes in Computer Science, page 166-175. Springer, (1999)Research on Influence Evaluation Based on RkNN and Its Application in Location Problem., , , , and . WISA, page 153-157. IEEE, (2017)A Common Application-Centric QoS Model for Selecting Optimal Grid Services., , , and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 807-819. Springer, (2005)Scalable Private Blocking Technique for Privacy-Preserving Record Linkage., , , , and . APWeb (2), volume 9932 of Lecture Notes in Computer Science, page 201-213. Springer, (2016)