Author of the publication

A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory.

, , , and . J. Comput. Sci. Technol., 27 (1): 213-224 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aggressive Complex Event Processing with Confidence over Out-of-Order Streams., , , and . J. Comput. Sci. Technol., 26 (4): 685-696 (2011)Subgraph similarity maximal all-matching over a large uncertain graph., , , and . World Wide Web, 19 (5): 755-782 (2016)Probery: A Probability-based Incomplete Query Optimization for Big Data., , , and . CoRR, (2019)Mim: A Merge Iteration and Its Applications for Big Data., , , , and . IEEE Access, (2018)Scalable Private Blocking Technique for Privacy-Preserving Record Linkage., , , , and . APWeb (2), volume 9932 of Lecture Notes in Computer Science, page 201-213. Springer, (2016)A Throughput Driven Task Scheduler for Improving MapReduce Performance in Job-Intensive Environments., , , , and . BigData Congress, page 211-218. IEEE Computer Society, (2013)Lightweight, High Performance Detection Method of Pipeline Defects Through Compact Off-Axis Magnetization and Sensing., , and . IEEE Access, (2019)A Common Application-Centric QoS Model for Selecting Optimal Grid Services., , , and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 807-819. Springer, (2005)Conversion cost and specification on interfaces of key-value stores., , , , , and . Comput. Stand. Interfaces, (2016)Performance Evaluation of a DOM-Based XML Database: Storage, Indexing and Query Optimization., , , , , and . WAIM, volume 2419 of Lecture Notes in Computer Science, page 13-24. Springer, (2002)