Author of the publication

A new external sorting algorithm with no additional disk space.

, , , and . Inf. Process. Lett., 86 (5): 229-233 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy., , , , , and . Concurrency and Computation: Practice and Experience, (2017)A new external sorting algorithm with no additional disk space., , , and . Inf. Process. Lett., 86 (5): 229-233 (2003)A tree-based approach to matchmaking algorithms for resource discovery., , and . Int. Journal of Network Management, 18 (5): 427-436 (2008)A Novel Approach for the Security Remedial in a Cloud-based E-learning Network., , and . JNW, 9 (11): 2934-2942 (2014)A Data Mining Approach to Predict Prospective Business Sectors for Lending in Retail Banking Using Decision Tree., and . CoRR, (2015)Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures., , , , and . ADC, volume 10837 of Lecture Notes in Computer Science, page 174-185. Springer, (2018)Chemical reaction optimization: survey on variants., , and . Evolutionary Intelligence, 12 (3): 395-420 (2019)Hybrids of support vector machine wrapper and filter based framework for malware detection., , , , , and . Future Generation Comp. Syst., (2016)Wrapper/TAM Co-Optimization and constrained Test Scheduling for SOCs Using Rectangle Bin Packing, , , , and . CoRR, (2010)New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques, , , and . CoRR, (2010)