Author of the publication

Multi-dimensional Index over a Key-Value Store for Semi-structured Data.

, , and . BigSDM, volume 11473 of Lecture Notes in Computer Science, page 165-175. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-step Ahead Time Series Forecasting for Different Data Patterns Based on LSTM Recurrent Neural Network., , , and . WISA, page 305-310. IEEE, (2017)Say No to Price Discrimination: Decentralized and Automated Incentives for Price Auditing in Ride-Hailing Services., , , , , and . IEEE Trans. Mob. Comput., 21 (2): 663-680 (2022)Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks., , , , and . WASA, volume 6843 of Lecture Notes in Computer Science, page 190-201. Springer, (2011)Bio-inspired Mechanism and Model Exploration of Software Aging., , , and . CoRR, (2014)Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin., , , and . IEEE J. Sel. Areas Commun., 41 (11): 3517-3532 (November 2023)Study on Influencing Factors of Microblog User's Malicious Disinhibition Behavior., , , and . IMMS, page 84-95. ACM, (2023)An Improved Heuristic for QoS-Aware Service Composition Framework., , , , , and . HPCC, page 360-367. IEEE Computer Society, (2008)AppSec: A Safe Execution Environment for Security Sensitive Applications., , , , and . VEE, page 187-199. ACM, (2015)A Comprehensive Trust Model Based on Reputation and Fuzzy Theory., , , , , and . J. Comput., 9 (11): 2666-2676 (2014)Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators., , , and . NDSS, The Internet Society, (2022)