Author of the publication

Exploiting Pattern Relationship for Intrusion Detection.

, , and . SAINT, page 200-208. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Caching Architecture for Efficient Video-on-Demand Services on the Internet., , and . SAINT, page 172-181. IEEE Computer Society, (2003)A Heuristic Information Retrieval Model on a Massively Parallel Processor., , and . ICDE, page 365-372. IEEE Computer Society, (1995)A Performance Evaluation of Load Balancing Techniques for Join Operations on Multicomputer Database Systems., , and . ICDE, page 44-51. IEEE Computer Society, (1995)Query Decomposition: A Multiple Neighborhood Approach to Relevance Feedback Processing in Content-based Image Retrieval., , and . ICDE, page 84. IEEE Computer Society, (2006)Robust wireless sharing of internet video streams., , and . Multimedia Syst., 19 (1): 65-76 (2013)Semi-Split TCP: Maintaining End-to-End Semantics for Split TCP., , , and . LCN, page 303-314. IEEE Computer Society, (2007)Image retrieval based on user-specified features in queries with multiple examples., , and . MMM, IEEE, (2006)Leveraging Computation Sharing and Parallel Processing in Location-Based Services., and . CSE (2), page 221-228. IEEE Computer Society, (2009)P2VoD: providing fault tolerant video-on-demand streaming in peer-to-peer environment., , and . ICC, page 1467-1472. IEEE, (2004)Parallel Simulated Annealing for Efficient Data Clustering., , and . DEXA, page 244-249. Springer-Verlag, Wien, (1992)