Author of the publication

CYBER: A CommunitY-Based sEaRch engine.

, , and . Peer-to-Peer Computing, page 215-224. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Multi-join Query Processing in PDBMS., , , and . ICDE, page 1239-1242. IEEE Computer Society, (2009)Preference-Driven Query Processing., , , and . ICDE, page 671-673. IEEE Computer Society, (2003)Pagrol: Parallel graph olap over large-scale attributed graphs., , , , , and . ICDE, page 496-507. IEEE Computer Society, (2014)Elaps: An efficient location-aware pub/sub system., , , , , and . ICDE, page 1504-1507. IEEE Computer Society, (2015)ChronoStream: Elastic stateful stream computation in the cloud., and . ICDE, page 723-734. IEEE Computer Society, (2015)Securing Your Data in Agent-Based P2P Systems., , and . DASFAA, page 55-62. IEEE Computer Society, (2003)Verifying Completeness of Relational Query Answers from Online Servers., and . ACM Trans. Inf. Syst. Secur., 11 (2): 5:1-5:50 (2008)A framework to enforce access control over data streams., , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 28:1-28:31 (2010)Authenticating kNN Query Results in Data Publishing., and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 47-63. Springer, (2007)Specifying Access Control Policies on Data Streams., , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 410-421. Springer, (2007)