Author of the publication

Similarity between Euclidean and cosine angle distance for nearest neighbor queries.

, , , and . SAC, page 1232-1237. ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation and histogram generation using the HSV color space for image retrieval., , and . ICIP (2), page 589-592. IEEE, (2002)Minimum user requirement in Role Based Access Control with Separation of Duty constraints., , and . ISDA, page 386-391. IEEE, (2012)Weighted Intra-transactional Rule Mining for Database Intrusion Detection., , and . PAKDD, volume 3918 of Lecture Notes in Computer Science, page 611-620. Springer, (2006)Supporting Negative Authorization in Spatiotemporal Role Based Access Control., and . NetCoM, page 422-427. IEEE Computer Society, (2009)Enforcing Separation of Duty in Attribute Based Access Control Systems., , , and . ICISS, volume 9478 of Lecture Notes in Computer Science, page 61-78. Springer, (2015)Attacking Image Based CAPTCHAs Using Image Recognition Techniques., , , , and . ICISS, volume 7671 of Lecture Notes in Computer Science, page 327-342. Springer, (2012)Optimal Rule Mining for Dynamic Authorization Management in Collaborating Clouds Using Attribute-Based Access Control., , and . CLOUD, page 739-742. IEEE Computer Society, (2017)Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy., , and . TrustBus, volume 5185 of Lecture Notes in Computer Science, page 118-127. Springer, (2008)Text and Non-text Separation in Scanned Color-Official Documents., , and . ICVGIP Workshops, volume 10481 of Lecture Notes in Computer Science, page 231-242. Springer, (2016)Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 446-460. Springer, (2007)