Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing Reverse k-Nearest Neighbors for Trajectories., , and . ADC, volume 10837 of Lecture Notes in Computer Science, page 262-274. Springer, (2018)Load Balancing for Moving Object Management in a P2P Network., , , and . DASFAA, volume 4947 of Lecture Notes in Computer Science, page 251-266. Springer, (2008)Shared Execution of Path Queries on Road Networks, , , and . CoRR, (2012)Estimating Travel Time of Dhaka City from Mobile Phone Call Detail Records., and . ICTD, page 14:1-14:11. ACM, (2017)SafeStreet: empowering women against street harassment using a privacy-aware location based application., , , , and . ICTD, page 24:1-24:4. ACM, (2015)Can We Predict the Scenic Beauty of Locations from Geo-tagged Flickr Images?, and . IUI, page 653-657. ACM, (2018)Protecting privacy for group nearest neighbor queries with crowdsourced data and computing., , , , and . UbiComp, page 559-562. ACM, (2013)CCCNet: An Attention Based Deep Learning Framework for Categorized Crowd Counting., , and . CoRR, (2019)An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks., , , and . SC Companion, page 1106-1115. IEEE Computer Society, (2012)Probabilistic Voronoi diagrams for probabilistic moving nearest neighbor queries., , , and . Data Knowl. Eng., (2012)