Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Processing Continuous Range Queries with Non-spatial Selections., , , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 31-38. Springer, (2013)Predictive Model for Protein Function Using Modular Neural Approach., , , , and . ICAPR (1), volume 3686 of Lecture Notes in Computer Science, page 400-409. Springer, (2005)Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data., , , and . J. Inf. Sci. Eng., 30 (3): 787-817 (2014)Fast Extraction of Maximal Frequent Subtrees Using Bits Representation., , , and . J. Inf. Sci. Eng., 25 (2): 435-464 (2009)Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , and . Sensors, 14 (7): 12937-12957 (2014)A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents., and . WISE Workshops, volume 4256 of Lecture Notes in Computer Science, page 94-103. Springer, (2006)Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees., , , , , and . KES (1), volume 4692 of Lecture Notes in Computer Science, page 672-679. Springer, (2007)Implementation of OSD Security Framework and Credential Cache., , , and . GPC, volume 4459 of Lecture Notes in Computer Science, page 666-671. Springer, (2007)Distributed File Discovery Protocol in Mobile Peer-to-Peer Networks., , and . NCM (1), page 335-340. IEEE Computer Society, (2008)A Data Sanitization Method for Privacy Preserving Data Re-publication., , , , and . NCM (2), page 28-31. IEEE Computer Society, (2008)978-0-7695-3322-3.