Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering near-duplicate images in large collections., , and . Multimedia Information Retrieval, page 21-30. ACM, (2007)Pruning SIFT for Scalable Near-duplicate Image Matching., and . ADC, volume 63 of CRPIT, page 63-71. Australian Computer Society, (2007)Using Redundant Bit Vectors for Near-Duplicate Image Detection., and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 472-484. Springer, (2007)Detection of near-duplicate images for web search., , , and . CIVR, page 557-564. ACM, (2007)Eagle: User profile-based anomaly detection for securing Hadoop clusters., , and . IEEE BigData, page 1336-1343. IEEE Computer Society, (2015)HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings., and . ACSC, volume 62 of CRPIT, page 97-105. Australian Computer Society, (2007)Discovery of Image Versions in Large Collections., , and . MMM (2), volume 4352 of Lecture Notes in Computer Science, page 433-442. Springer, (2007)Astro: A predictive model for anomaly detection and feedback-based scheduling on Hadoop., , , , and . IEEE BigData, page 854-862. IEEE Computer Society, (2014)Using Random Sampling to Build Approximate Tries for Efficient String Sorting., and . WEA, volume 3059 of Lecture Notes in Computer Science, page 529-544. Springer, (2004)Engineering scalable, cache and space efficient tries for strings., and . VLDB J., 19 (5): 633-660 (2010)