From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Investigation into Methods and Concepts of Qualitative Research in Information System Research., , , , и . Computer and Information Science, 2 (4): 47-54 (2009)High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment., , , , и . Computer and Information Science, 1 (2): 95-105 (2008)An encoding scheme based on fractional number for querying and updating XML data., , , и . J. Syst. Softw., 85 (8): 1831-1851 (2012)Transaction Management in Mobile Databases., , , и . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)A framework for caching relevant data items for checking integrity constraints of mobile database., , , и . ICDIM, стр. 476-482. IEEE, (2008)Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations., и . iiWAS, стр. 750-754. ACM, (2009)Data caching strategies for checking integrity constraints of mobile database., , и . iiWAS, стр. 186-192. ACM, (2008)Analytical Studies and Experimental Examines for Flooding-Based Search Algorithms., , , и . ICICA (LNCS), том 7473 из Lecture Notes in Computer Science, стр. 299-306. Springer, (2012)Data quality: A survey of data quality dimensions., , , , , и . CAMP, стр. 300-304. IEEE, (2012)An Effective Naming Heterogeneity Resolution for XACML Policy Evaluation in a Distributed Environment., , , , и . Symmetry, 13 (12): 2394 (2021)