Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Model for XML Data., , and . International Conference on Internet Computing (1), page 400-406. CSREA Press, (2001)Querying XML with Constraints., , and . International Conference on Internet Computing (1), page 171-177. CSREA Press, (2001)Clustering of Social Tagging System Users: A Topic and Time Based Approach., , , and . WISE, volume 5802 of Lecture Notes in Computer Science, page 75-86. Springer, (2009)XML-Based Revocation and Delegation in a Distributed Environment., , , and . EDBT Workshops, volume 3268 of Lecture Notes in Computer Science, page 299-308. Springer, (2004)Image clustering through community detection on hybrid image similarity graphs., , , , , , and . ICIP, page 2353-2356. IEEE, (2010)Data placement schemes in replicated mirrored disk systems., and . J. Syst. Softw., 55 (2): 115-128 (2000)Capturing Social Data Evolution Using Graph Clustering., and . IEEE Internet Comput., 17 (1): 74-79 (2013)Local community detection with hints., , and . Appl. Intell., 52 (9): 9599-9620 (2022)Bias in Internet Measurement Platforms., , , , , and . TMA, page 1-10. IEEE, (2023)A multi-layer software architecture framework for adaptive real-time analytics., , and . IEEE BigData, page 2425-2430. IEEE Computer Society, (2016)