Author of the publication

Blockchain Access Control Ecosystem for Big Data Security.

, , , and . iThings/GreenCom/CPSCom/SmartData, page 1373-1378. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diabetic Retinopathy Classification Using a Modified Xception Architecture., , , , , and . ISSPIT, page 1-6. IEEE, (2019)On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic Code Clone Validation Tools, , , , and . 2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM), page 155?164. IEEE, (2018)Micro-clones in evolving software, , and . 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), page 50?60. IEEE, (2018)An exploratory study on change suggestions for methods using clone detection, , and . Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, page 85?95. IBM Corp., (2016)How Developers Use Exception Handling in Java?, and . (2016)Mining Software Information Sites to Recommend Cross-Language Analogical Libraries., , , , and . SANER, page 913-924. IEEE, (2022)Backports: change types, challenges and strategies., , and . ICPC, page 636-647. ACM, (2022)SET-STAT-MAP: Extending Parallel Sets for Visualizing Mixed Data., , , , , and . PacificVis, page 151-160. IEEE, (2022)CloneCognition: machine learning based code clone validation tool., , , , and . ESEC/SIGSOFT FSE, page 1105-1109. ACM, (2019)Optimized Storing of Workflow Outputs through Mining Association Rules., , , , and . IEEE BigData, page 508-515. IEEE, (2018)