Author of the publication

DHT-Based Range Query Processing for Web Service Discovery.

, , , , and . ICWS, page 477-484. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AHBP: An Efficient Broadcast Protocol for Mobile Ad Hoc Networks., and . J. Comput. Sci. Technol., 16 (2): 114-125 (2001)Survey of DHT topology construction techniques in virtual computing environments., , and . SCIENCE CHINA Information Sciences, 54 (11): 2221-2235 (2011)Energy-efficient lifetime maximization and sleeping scheduling supporting data fusion and QoS in Multi-SensorNet., and . Signal Processing, 87 (12): 2949-2964 (2007)Efficient range query processing over DHTs based on the balanced Kautz tree., , , and . Concurrency and Computation: Practice and Experience, 23 (8): 796-814 (2011)Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms., , and . Computers & Security, 28 (8): 827-842 (2009)A Push-Based Prefetching for Remote Caching RAM Grid., , and . IJGHPC, 1 (4): 1-15 (2009)Dynamic Self-Adaptive Replica Location Method in Data Grids., , , , and . CLUSTER, page 442-445. IEEE Computer Society, (2003)HonIDS: Enhancing Honeypot System with Intrusion Detection Models., , , and . IWIA, page 135-143. IEEE Computer Society, (2006)Characterizing Enough Vantage Points for Pinpointing Routing Instability., , , and . IPDPS Workshops, page 1270-1275. IEEE Computer Society, (2012)Distributed Line Graphs: A Universal Framework for Building DHTs Based on Arbitrary Constant-Degree Graphs., , , and . ICDCS, page 152-159. IEEE Computer Society, (2008)