Author of the publication

A Model for Ranking and Selecting Integrity Tests in a Distributed Database.

, , and . Int. J. Inf. Technol. Web Eng., 5 (3): 65-84 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active warden as the main hindrance for steganography information retrieval., , , , and . CAMP, page 277-280. IEEE, (2012)Towards secure model for SCADA systems., , , , and . CyberSec, page 60-64. IEEE, (2012)Effective mining on large databases for intrusion detection., , , , and . ISBAST, page 204-207. IEEE, (2014)Using process mining to business process distribution., , , and . SAC, page 2140-2145. ACM, (2009)Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation., , , and . FNC/MobiSPC, volume 56 of Procedia Computer Science, page 370-375. Elsevier, (2015)A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database., , , , and . ANT/MobiWIS, volume 10 of Procedia Computer Science, page 894-901. Elsevier, (2012)Efficient Skyline Processing Algorithm over Dynamic and Incomplete Database., , , , and . iiWAS, page 190-199. ACM, (2018)A Hybrid Scheme for Face Template Protection., , , and . IMCOM, page 6:1-6:7. ACM, (2016)Artificial Immune Recognition System with Nonlinear Resource Allocation Method and Application to Traditional Malay Music Genre Classification., , , , and . ICARIS, volume 5132 of Lecture Notes in Computer Science, page 132-141. Springer, (2008)An Evaluation on KNN-SVM Algorithm for Detection and Prediction of DDoS Attack., , and . IEA/AIE, volume 9799 of Lecture Notes in Computer Science, page 95-102. Springer, (2016)