Author of the publication

Algorithm for Fast Spatial Outlier Detection.

, , , , and . ICYCS, page 1872-1877. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extensible Motor of a Object-Relational DBMS: Design and Implementation., , and . TOOLS (31), page 372-379. IEEE Computer Society, (1999)A Location-Based Secure Spatial Audit Policy Model., , and . CSSE (4), page 619-622. IEEE Computer Society, (2008)978-0-7695-3336-0.Active Authorization Rules for Enforcing RBAC with Spatial Characteristics., , and . ISCSCT (2), page 632-636. IEEE Computer Society, (2008)Privacy Preserving Spatial Outlier Detection., , , , and . ICYCS, page 714-719. IEEE Computer Society, (2008)Enforcement of Spatial Separation of Duty Constraint., , and . ICYCS, page 2108-2114. IEEE Computer Society, (2008)Design and Implementation of Generalized R-Tree., , and . ISCSCT (1), page 777-781. IEEE Computer Society, (2008)Algorithm for Fast Spatial Outlier Detection., , , , and . ICYCS, page 1872-1877. IEEE Computer Society, (2008)Research of Access Control in Electronic Medical Record Based on UCON., , and . CIS, page 1037-1040. IEEE Computer Society, (2011)