Author of the publication

Failure Handling in an Optimized Two-Safe Approach to Maintaining Primary-Backup Systems.

, , and . SRDS, page 161-167. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mehrotra, Sharad
add a person with the name Mehrotra, Sharad
 

Other publications of authors with the same name

On Optimal and Fair Service Allocation in Mobile Cloud Computing., , , and . CoRR, (2013)Semi-Supervised Few-Shot Learning for Dual Question-Answer Extraction., , , , and . CoRR, (2019)Adaptive Transformation for Robust Privacy Protection in Video Surveillance., , , and . Adv. in MM, (2012)The Beckman report on database research., , , , , , , , , and 20 other author(s). Commun. ACM, 59 (2): 92-99 (2016)Exploiting Web querying for Web people search., , and . ACM Trans. Database Syst., 37 (1): 7:1-7:41 (2012)Locally adaptive dimensionality reduction for indexing large time series databases., , , and . ACM Trans. Database Syst., 27 (2): 188-228 (2002)Query-Driven Approach to Face Clustering and Tagging., , , , and . IEEE Trans. Image Processing, 25 (10): 4504-4513 (2016)Mobipedia: Mobile Applications Linked Data., , , , , and . International Semantic Web Conference (Posters & Demos), volume 1486 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)The Hybrid Tree: An Index Structure for High Dimensional Feature Spaces., and . ICDE, page 440-447. IEEE Computer Society, (1999)Building a Mobile Applications Knowledge Base for the Linked Data Cloud., , , , , and . MoDeST@ISWC, volume 1506 of CEUR Workshop Proceedings, page 14-25. CEUR-WS.org, (2015)