Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crossfertilization Of DBMS Research With Other Disciplines Of Computer Science (Panel Discussion)., , , , and . ACM Annual Conference (1), page 325. ACM, (1978)Novelty Detection and Adaptation: A Domain Agnostic Approach., , and . ISIC, volume 2786 of CEUR Workshop Proceedings, page 73-77. CEUR-WS.org, (2021)Experiments in Adaptable and Secure Multimedia Database Systems (Invited Paper)., and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 1096-1101. Springer, (1999)Adaptable Safety and Security in V2X Systems., , and . ICIOT, page 17-24. IEEE Computer Society, (2017)Adaptility Experiments in the RAID Distributed Data Base System., , , and . SRDS, page 76-85. IEEE Computer Society, (1990)An Efficient MPEG Video Encryption Algorithm., and . SRDS, page 381-386. IEEE Computer Society, (1998)A Fragmentation Scheme for Multimedia Traffic in Active Networks., and . SRDS, page 437-442. IEEE Computer Society, (1998)An Adaptable Constrained Locking Protocol for High Data Contention Environments., , and . DASFAA, page 321-328. IEEE Computer Society, (1999)DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters., , , , , , and . ACSOS, page 109-118. IEEE, (2020)An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing., , , , , , and . SRDS, page 177-183. IEEE Computer Society, (2010)