default search action
M. V. Ramakrishna
Person information
- affiliation: Monash University, Melbourne, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]G. M. Sridevi, M. V. Ramakrishna, D. V. Ashoka:
Comprehensive Performance Study of Hashing Functions. Comput. Sci. J. Moldova 31(2): 183-199 (2023)
2000 – 2009
- 2007
- [c20]Ying Li, M. V. Ramakrishna, Seng Wai Loke:
An Optimal Distribution of Data Reduction in Sensor Networks with Hierarchical Caching. EUC 2007: 598-609 - [c19]Ying Li, Seng Wai Loke, M. V. Ramakrishna:
Performance study of data stream approximation algorithms in wireless sensor networks. ICPADS 2007: 1-8 - 2006
- [c18]Ying Li, M. V. Ramakrishna, Seng Wai Loke:
Approximate Query Answering in Sensor Networks with Hierarchically Distributed Caching. AINA (2) 2006: 281-285 - 2002
- [c17]M. V. Ramakrishna, Surya Nepal, P. K. Srivastava:
A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases. Australasian Database Conference 2002 - 2000
- [c16]M. V. Ramakrishna:
A learning by doing model for teaching advanced databases. ACSE 2000: 203-207 - [c15]Surya Nepal, M. V. Ramakrishna:
An evaluation measure for query processing in CBIR systems. IRMA Conference 2000: 41-45
1990 – 1999
- 1999
- [c14]Surya Nepal, M. V. Ramakrishna, James A. Thom:
A Fuzzy Object Query Language (FOQL) for Image Databases. DASFAA 1999: 117-124 - [c13]Santosh Kulkarni, Bala Srinivasan, M. V. Ramakrishna:
Vector-Space Image Model (VSIM) for Content-Based Retrieval. DEXA Workshop 1999: 899-903 - [c12]Surya Nepal, M. V. Ramakrishna:
Query Processing Issues in Image (Multimedia) Databases. ICDE 1999: 22-29 - 1998
- [c11]Surya Nepal, M. V. Ramakrishna, James A. Thom:
Four Layer Schema for Image Modeling. Australasian Database Conference 1998: 189-200 - [c10]Surya Nepal, M. V. Ramakrishna, James A. Thom:
A Research Prototype Image Retrieval System. SIGIR 1998: 386 - 1997
- [j6]M. V. Ramakrishna, E. Fu, E. Bahcekapili:
Efficient Hardware Hashing Functions for High Performance Computers. IEEE Trans. Computers 46(12): 1378-1381 (1997) - [c9]M. V. Ramakrishna, Justin Zobel:
Performance in Practice of String Hashing Functions. DASFAA 1997: 215-224 - 1994
- [j5]M. V. Ramakrishna:
Bounded Disorder File Organization. IEEE Trans. Knowl. Data Eng. 6(1): 79-85 (1994) - 1992
- [j4]M. V. Ramakrishna, Edgar A. Ramos:
Optimal Distribution of Signatures in Signature Hashing. IEEE Trans. Knowl. Data Eng. 4(1): 83-88 (1992) - [c8]M. V. Ramakrishna:
A Simple Perfect Hashing Method for Static Sets. ICCI 1992: 401-404 - 1991
- [c7]M. V. Ramakrishna, G. A. Portice:
Perfect Hashing Functions for Hardware Applications. ICDE 1991: 464-470
1980 – 1989
- 1989
- [j3]M. V. Ramakrishna:
Practical Performance Of Bloom Filters and Parallel Free-Text Searching. Commun. ACM 32(10): 1237-1239 (1989) - [j2]M. V. Ramakrishna:
Analysis of Random Probing Hashing. Inf. Process. Lett. 31(2): 83-90 (1989) - [j1]M. V. Ramakrishna, Per-Åke Larson:
File Organization Using Composite Perfect Hashing. ACM Trans. Database Syst. 14(2): 231-263 (1989) - [c6]Yunmo Chung, M. V. Ramakrishna:
Dynamic signature hashing. COMPSAC 1989: 257-262 - [c5]M. V. Ramakrishna, Walid R. Tout:
Dynamic External Hashing with Guaranteed Single Access Retrieval. FODO 1989: 187-201 - 1988
- [c4]M. V. Ramakrishna:
An Exact Probability Model for Finite Hash Tables. ICDE 1988: 362-368 - [c3]M. V. Ramakrishna, P. Mukhopadhyay:
Analysis of Bounded Disorder File Organization. PODS 1988: 117-125 - [c2]M. V. Ramakrishna:
Hashing in Practive, Analysis of Hashing and Universal Hashing. SIGMOD Conference 1988: 191-199 - 1985
- [c1]Per-Åke Larson, M. V. Ramakrishna:
External Perfect Hashing. SIGMOD Conference 1985: 190-200
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint