Author of the publication

Keyword-based k-nearest neighbor search in spatial databases.

, , and . CIKM, page 2144-2148. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The L-fuzzy vector subspace degrees and its induced convex structure., and . Comput. Appl. Math., 43 (3): 131 (April 2024)Dominance Hierarchies Induce a Population's Full Cooperation., , , and . Dyn. Games Appl., 4 (4): 432-447 (2014)On potentials of regularized Wasserstein generative adversarial networks for realistic hallucination of tiny faces., , , , , , and . Neurocomputing, (2019)Three-Dimensional Encoding Approach for Wearable Tactile Communication Devices., , , , , and . Sensors, 22 (24): 9568 (2022)Prediction of forest unit volume based on hybrid feature selection and ensemble learning., , , , and . Evol. Intell., 13 (1): 21-32 (2020)Macro process of knowledge management for continuous innovation., , , and . J. Knowl. Manag., 14 (4): 573-591 (2010)Device-to-device assisted two-stage cooperative multicast with optimal resource utilization., , , and . GLOBECOM Workshops, page 839-844. IEEE, (2014)A cloud-user behavior assessment based dynamic access control model., , , , and . Int. J. Syst. Assur. Eng. Manag., 8 (3s): 1966-1975 (2017)Performance modeling and prediction of enterprise JavaBeans with layered queuing network templates., , , and . ACM SIGSOFT Softw. Eng. Notes, (2006)Redundant Sniffer Deployment for Multi-Channel Wireless Network Forensics With Unreliable Conditions., , , , , and . IEEE Trans. Cogn. Commun. Netw., 6 (1): 394-407 (2020)