Author of the publication

Bucket-size balancing locality sensitive hashing using the map reduce paradigm.

, , , and . Clust. Comput., 22 (Suppl 1): 1959-1971 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving the Multi-class Classification Task in Spiking Neural Network by using Supervised Spiking Learning Rule with a Consistent Competitive Mechanism., and . RACS, page 77-81. ACM, (2020)Autonomous Machine Learning Modeling using a Task Ontology., , , , and . SCIS&ISIS, page 244-248. IEEE, (2018)A deep learning model generation method for code reuse and automatic machine learning., , , , and . RACS, page 47-52. ACM, (2018)Person-Wise Privacy Level Access Control for Personal Information Directory Services., , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 89-98. Springer, (2006)A New Scheme for Nucleotide Sequence Signature Extraction., , , and . ICMLA, page 162-167. IEEE Computer Society, (2006)Locality-Sensitive Hashing for Data with Categorical and Numerical Attributes Using Dual Hashing.. Int. J. Fuzzy Log. Intell. Syst., 14 (2): 98-104 (2014)A Multiagent System for Workflow-Based Bioinformatics Tool Integration., , and . Int. J. Fuzzy Log. Intell. Syst., 3 (2): 133-137 (2003)A Quantitative Trust Model Based on Multiple Evaluation Criteria., and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 1036-1043. Springer, (2005)Adaptive Resource Scheduling for Workflows Considering Competence and Preference.. KES, volume 3214 of Lecture Notes in Computer Science, page 723-730. Springer, (2004)A study on supporting spiking neural network models based on multiple neuromorphic processors., , , , , and . RACS, page 131-132. ACM, (2019)