Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ad-hoc aggregate query processing algorithms based on bit-store for query intensive applications in cloud computing., , , , , and . Future Gener. Comput. Syst., 29 (7): 1725-1735 (2013)Efficient Top-k Dominating Computation on Massive Data., , and . IEEE Trans. Knowl. Data Eng., 29 (6): 1199-1211 (2017)The impact of sample imbalance on identifying differentially expressed genes., , and . BMC Bioinform., (2006)Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services., , , , , and . IEEE Access, (2017)Discovery of Field Functional Dependencies., , , and . ISKE, page 448-455. IEEE, (2015)Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree., , , and . ADMA, volume 4632 of Lecture Notes in Computer Science, page 158-169. Springer, (2007)Multi-Weighted Tree Based Query Optimization Method for Parallel Relational Database Systems., , and . CODAS, page 205-212. IEEE Computer Society, (2001)Detecting Top-k Active Inter-Community Jumpers in Dynamic Information Networks., , , , and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 538-546. Springer, (2018)ε-Approximation to data streams in sensor networks., , and . INFOCOM, page 1663-1671. IEEE, (2013)A Distributed and Kernel-Based Scheme for Location Verification in Wireless Sensor Networks., , , and . Ad Hoc Sens. Wirel. Networks, 18 (3-4): 333-351 (2013)