Author of the publication

Incorporating Semantics-Based Search and Policy-Based Access Control Mechanism in Context Service Delivery.

, , , and . ACIS-ICIS, page 175-180. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases., , , and . IEEE Trans. Knowl. Data Eng., 21 (12): 1708-1721 (2009)Sentiment analysis at sentence level for heterogeneous datasets., , , and . EDB, page 159-163. ACM, (2016)A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations., , , and . VLDB, page 416-425. Morgan Kaufmann, (1997)Shortest Path Analysis in Social Graphs., , and . CoRR, (2014)More reputable recommenders give more accurate recommendations?, , , , and . ICUIMC, page 24. ACM, (2013)SP2: spanner construction for shortest path computation on streaming graph., , , , and . EDB, page 43-50. ACM, (2016)Visualizations of human activities in sensor-enabled ubiquitous environments., , , and . ICUMT, page 1-6. IEEE, (2009)Comparative Analysis of XLMiner and Weka for Association Rule Mining and Clustering., , , , and . FGIT-DTA, volume 64 of Communications in Computer and Information Science, page 82-89. Springer, (2009)Hop-Based Energy Aware Routing Algorithm for Wireless Sensor Networks., , , , and . IEICE Trans. Commun., 93-B (2): 305-316 (2010)A Study on the Feasibility of Active Contours on Automatic CT Bone Segmentation., , , and . J. Digit. Imaging, 23 (6): 793-805 (2010)