Author of the publication

Hybrid Cloud Support for Large Scale Analytics and Web Processing.

, , , , and . WebApps, page 39-50. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Regular Patterns in Weighted-Directed Networks., , and . ICIT, page 215-220. IEEE, (2014)Hybrid Cloud Support for Large Scale Analytics and Web Processing., , , , and . WebApps, page 39-50. USENIX Association, (2012)CDIS: Circle Density Based Iris Segmentation., , , and . IC3, volume 40 of Communications in Computer and Information Science, page 295-306. Springer, (2009)Text Summarisation Using Laplacian Centrality-Based Minimum Vertex Cover., and . J. Inf. Knowl. Manag., 18 (4): 1950050:1-1950050:20 (2019)Malafide Intension Based Detection of Privacy Violation in Information System., , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 365-368. Springer, (2006)CDIA-DS: A framework for efficient reconstruction of compound document image using data structure., , , and . IC3, page 1-7. IEEE Computer Society, (2016)Preserving Obliviousness Characteristic of Honeypot database., , , , and . COMAD, page 72-79. Tata McGraw-Hill Publishing Company Limited, (2006)TAG: A two-level framework for user authentication through hand gestures., , and . IC3, page 503-509. IEEE, (2013)Multi-class instance-incremental framework for classification in fully dynamic graphs., , , and . Int. J. Comput. Sci. Eng., 21 (1): 69-83 (2020)InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices., , and . IC3, volume 40 of Communications in Computer and Information Science, page 637-648. Springer, (2009)