Author of the publication

Evaluation of Recursive Queries with Extended Rules in Deductive Databases.

, and . IEEE Trans. Knowl. Data Eng., 7 (2): 328-331 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Device Authentication Protocol Using Bioinformatic., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 567-575. Springer, (2006)Comparative Performance of State-of-the-Art Classifiers in Computer-Aided Detection for CT Colonography., , and . Abdominal Imaging, volume 7601 of Lecture Notes in Computer Science, page 78-87. Springer, (2012)Efficient Unilateral Authentication Mechanism for MIPv6., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 908-911. Springer, (2006)An Empirical Study on the Change of Web Pages., and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 632-642. Springer, (2005)A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN., , , and . J. Digit. Content Technol. its Appl., 2 (1): 61-66 (2008)Asynchronous Edge Learning using Cloned Knowledge Distillation., , and . CoRR, (2020)Company Name Discrimination in Tweets using Topic Signatures Extracted from News Corpus., , and . JCSE, (2016)Integration Analysis of Diverse Genomic Data Using Multi-clustering Results., , , and . ISBMDA, volume 4345 of Lecture Notes in Computer Science, page 37-48. Springer, (2006)An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme., and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 93-104. Springer, (2007)Identity-Based Key Issuing Without Secure Channel in a Broad Area., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 30-44. Springer, (2006)