Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems., , , and . IEEE ICCI, page 538-541. IEEE Computer Society, (2009)Kernel-based data fusion improves the drug-protein interaction prediction., , , and . Comput. Biol. Chem., 35 (6): 353-362 (2011)Document Clustering using Compound Words., and . IC-AI, page 307-313. CSREA Press, (2005)An Agile Protocol for E-Commerce., and . ICEB, page 393-396. Academic Publishers/World Publishing Corporation, (2004)Random Sampling Algorithms for Landmark Windows over Data Streams., , , , and . ICEIS (1), page 103-107. (2006)Kinetic studies of methanol steam reforming over Pd/ZnO catalyst using a microchannel reactor, , , , and . Applied Catalysis A: General, 262 (1): 19-29 (2004/5/10 2004)TY - JOUR.A combinatorial model and algorithm for globally searching community structure in complex networks., , , and . J. Comb. Optim., 23 (4): 425-442 (2012)RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow., , , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 99-109. Springer, (2010)Using Model Trees for Classification, , , , and . Machine Learning, 32 (1): 63-76 (1998)Robust Control Design of Uncertain Mechanical Systems: A Fuzzy Approach., , , , , and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 24 (2): 307-324 (2016)