Author of the publication

Efficient range queries in spatial databases over Peer-to-Peer Networks.

, , and . Int. J. Internet Protoc. Technol., 4 (2): 79-90 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach., and . Multimedia Tools Appl., 76 (6): 8627-8650 (2017)On the embedding limits of the discrete cosine transform., and . Multimedia Tools Appl., 75 (10): 5939-5957 (2016)A Survey on Using Blockchain in Trade Supply Chain Solutions., , and . IEEE Access, (2019)NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems., , , , , , and . VLDB, page 1295-1298. ACM, (2005)A novel memory management scheme for residential gateways., and . Inf. Syst. Frontiers, 11 (5): 491-500 (2009)Providing Interactive Functions through Active Client-Buffer Management in Partitioned Video Multicast VoD Systems., , , and . Networked Group Communication, volume 1736 of Lecture Notes in Computer Science, page 152-169. Springer, (1999)Hiding Information in Reversible English Transforms for a Blind Receiver., and . Applied Comp. Int. Soft Computing, (2015)Managing multi-priority services in ubiquitous computing applications., , and . Int. J. Internet Protoc. Technol., 5 (3): 154-165 (2010)Achieving Stronger Compaction for DCT-Based Steganography: A Region-Growing Approach., , and . WorldCIST (2), volume 1160 of Advances in Intelligent Systems and Computing, page 251-261. Springer, (2020)Customs-Based Distributed Risk Assessment Method., , and . PAAP, volume 1163 of Communications in Computer and Information Science, page 417-429. Springer, (2019)