Consensus algorithms in blockchain: Comparative analysis, challenges and opportunities N Chaudhry, MM Yousaf 2018 12th international conference on open source systems and technologies …, 2018 | 215 | 2018 |
Architectural assessment of NoSQL and NewSQL systems N Chaudhry, MM Yousaf Distributed and Parallel Databases 38 (4), 881-926, 2020 | 15 | 2020 |
Indexing of real time geospatial data by IoT enabled devices: Opportunities, challenges and design considerations N Chaudhry, MM Yousaf, MT Khan Journal of Ambient Intelligence and Smart Environments 12 (4), 281-312, 2020 | 12 | 2020 |
Spatial querying of mineral resources using PostGIS N Chaudhry, MM Yousaf 2019 2nd International Conference on Advancements in Computational Sciences …, 2019 | 8 | 2019 |
Concurrency control for real‐time and mobile transactions: Historical view, challenges, and evolution of practices N Chaudhry, MM Yousaf Concurrency and Computation: Practice and Experience 34 (3), e6549, 2022 | 6 | 2022 |
Security assessment of data management systems for cyber physical system applications N Chaudhry, MM Yousaf, MT Khan Journal of Software: Evolution and Process 32 (2), e2241, 2020 | 6 | 2020 |
IP Camera Based Video Surveillance Using Object’s Boundary Specification N Chaudhry, KMU Suleman International Journal of Information Technology and Computer Science (IJITCS …, 2016 | 2 | 2016 |
A, M.,“Integrating Case-Based Reasoning and Tabu Search for University Makeup Class Scheduling” N Chaudhry, R Nayab, S Bashir, F Alvi, S Taimoor Journal of Applied Enviromental and Biological Sciences 4 (9S), 36-44, 2014 | 2 | 2014 |
A hash-based index for processing frequent updates and continuous location-based range queries N Chaudhry, MM Yousaf Knowledge and Information Systems 65 (10), 4233-4271, 2023 | 1 | 2023 |
Exploiting hashing for concurrent query processing and indexing of current location of moving objects N Chaudhry, MM Yousaf Concurrency and Computation: Practice and Experience, e8013, 2024 | | 2024 |
An Authentication Scheme Authentication Scheme Authentication Scheme for SIP using Needham Schroeder using Needham Schroeder Authentication Protocol Authentication Protocol N Chaudhry, R Sirhindi | | |
An Authentication Scheme for SIP using Needham Schroeder Authentication Protocol RS Natalia chaudhry International Journal of Computer Science and Network 3 (4), 0 | | |