Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticated Subgraph Similarity Searchin Outsourced Graph Databases., , , , and . IEEE Trans. Knowl. Data Eng., 27 (7): 1838-1860 (2015)An Error-Resilient and Tunable Distributed Indexing Scheme for Wireless Data Broadcast., , , , and . IEEE Trans. Knowl. Data Eng., 18 (2): 392-404 (2006)Placement problems for transparent data replication proxy services., , and . IEEE Journal on Selected Areas in Communications, 20 (7): 1383-1398 (2002)Accelerating Viola-Jones Facce Detection Algorithm on GPUs., , , and . HPCC-ICESS, page 396-403. IEEE Computer Society, (2012)Sublogarithmic Space-Bounded Multi-Inkdot Alternating Turing Machines with Only Existential (Universal) States., , and . IEICE Transactions, 89-A (5): 1417-1420 (2006)Authentication of Moving Top-k Spatial Keyword Queries., , , and . IEEE Trans. Knowl. Data Eng., 27 (4): 922-935 (2015)Geometric Active Learning via Enclosing Ball Boundary., , , , and . CoRR, (2018)FD-buffer: a buffer manager for databases on flash disks., , , , , and . CIKM, page 1297-1300. ACM, (2010)FD-Buffer: A Cost-Based Adaptive Buffer Replacement Algorithm for FlashMemory Devices., , , , , and . IEEE Trans. Computers, 63 (9): 2288-2301 (2014)Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains., , , and . CoRR, (2019)