Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Model for XML Data., , and . International Conference on Internet Computing (1), page 400-406. CSREA Press, (2001)Querying XML with Constraints., , and . International Conference on Internet Computing (1), page 171-177. CSREA Press, (2001)Image clustering through community detection on hybrid image similarity graphs., , , , , , and . ICIP, page 2353-2356. IEEE, (2010)Capturing Social Data Evolution Using Graph Clustering., and . IEEE Internet Comput., 17 (1): 74-79 (2013)Data placement schemes in replicated mirrored disk systems., and . J. Syst. Softw., 55 (2): 115-128 (2000)Clustering of Social Tagging System Users: A Topic and Time Based Approach., , , and . WISE, volume 5802 of Lecture Notes in Computer Science, page 75-86. Springer, (2009)XML-Based Revocation and Delegation in a Distributed Environment., , , and . EDBT Workshops, volume 3268 of Lecture Notes in Computer Science, page 299-308. Springer, (2004)Non-linear correlation of content and metadata information extracted from biomedical article datasets., , and . J. Biomed. Informatics, 41 (1): 202-216 (2008)Local community detection with hints., , and . Appl. Intell., 52 (9): 9599-9620 (2022)Dissimilarity Features in Recommender Systems., , and . ICDM Workshops, page 825-832. IEEE Computer Society, (2013)