Author of the publication

Efficient shortest path finding of k-nearest neighbor objects in road network databases.

, , , , and . SAC, page 1661-1665. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective Approach to Outlier Detection Based on Centrality and Centre-Proximity., , , , , , and . Informatica, 31 (3): 435-458 (2020)An Efficient Sheet Partition Technique for Very Large Relational Tables in OLAP., , , , and . BNCOD, volume 4587 of Lecture Notes in Computer Science, page 176-179. Springer, (2007)Security Technologies Based on Home Gateway for Making Smart Home Secure., , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 124-135. Springer, (2007)CentralMatch: A Fast and Accurate Method to Identify Blog-Duplicates., , , and . Web Intelligence, page 112-119. IEEE Computer Society, (2010)MONET: Modality-Embracing Graph Convolutional Network and Target-Aware Attention for Multimedia Recommendation., , , and . WSDM, page 332-340. ACM, (2024)Analysis of SCTP Handover by Movement Patterns., , and . ICIC (2), volume 3645 of Lecture Notes in Computer Science, page 521-529. Springer, (2005)A Topic-Oriented Analysis of Information Diffusion in a Blogosphere., , , , and . DEXA (2), volume 7447 of Lecture Notes in Computer Science, page 129-140. Springer, (2012)Convergence of the preconditioned AOR method for irreducible L-matrices., and . Appl. Math. Comput., 201 (1-2): 56-64 (2008)Credible, resilient, and scalable detection of software plagiarism using authority histograms., , , , , and . Knowl. Based Syst., (2016)Fraud Detection in Comparison-Shopping Services: Patterns and Anomalies in User Click Behaviors., , , and . IEICE Trans. Inf. Syst., 100-D (10): 2659-2663 (2017)