Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective Clustering Approach to Web Query Log Anonymization., and . SECRYPT, page 109-119. SciTePress, (2010)From Text Representation to Financial Market Prediction: A Literature Review., , and . Inf., 13 (10): 466 (2022)Neighborhood randomization for link privacy in social network analysis., and . World Wide Web, 18 (1): 9-32 (2015)Hybrid Machine Learning-Based Approaches for Feature and Overfitting Reduction to Model Intrusion Patterns., , and . J. Cybersecur. Priv., 3 (3): 544-557 (August 2023)Generating Fixtures for JavaScript Unit Testing (T)., , and . ASE, page 190-200. IEEE Computer Society, (2015)High Dimensional Problem Optimization Using Distributed Multi-agent PSO., , , and . EMS, page 245-250. IEEE Computer Society, (2009)JSNOSE: Detecting JavaScript Code Smells., and . SCAM, page 116-125. IEEE Computer Society, (2013)Competitive-Cooperative Automated Reasoning from Distributed and Multiple Source of Data.. Data Mining and Multi-agent Integration, Springer, (2009)Pandemic programming., , , , , , , , , and 7 other author(s). Empir. Softw. Eng., 25 (6): 4927-4961 (2020)Pandemic Programming: How COVID-19 affects software developers and how their organizations can help., , , , , , , , , and 7 other author(s). CoRR, (2020)