Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring cumulated Anomaly in Databases., , and . International Journal of Software Engineering and Knowledge Engineering, 19 (3): 421-452 (2009)An Effective Data Placement Strategy for XML Documents., and . BNCOD, volume 2097 of Lecture Notes in Computer Science, page 43-56. Springer, (2001)An Efficient Region Matching Method for Content-based Image Retrieval., , , and . JDCTA, 4 (7): 210-214 (2010)Deep Multiple Auto-Encoder-Based Multi-view Clustering., , , , and . Data Sci. Eng., 6 (3): 323-338 (2021)Organisation and management of shared documents in super-peer networks based semantic hierarchical cluster trees., , and . Peer-to-Peer Netw. Appl., 5 (3): 292-308 (2012)Neighbor-aware deep multi-view clustering via graph convolutional network., , , , and . Inf. Fusion, (May 2023)Executing Query over Encrypted Character Strings in Databases., , , and . FCST, page 90-97. IEEE Computer Society, (2007)A Game Theory Based Approach for Community Detection in Social Networks., , , and . BNCOD, volume 7968 of Lecture Notes in Computer Science, page 268-281. Springer, (2013)Dynamic Damage Recovery for Web Databases., , , and . J. Comput. Sci. Technol., 25 (3): 548-561 (2010)Detecting Communities with Different Sizes for Social Network Analysis., and . Comput. J., 58 (9): 1894-1908 (2015)