Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Importance of Terrorists in a Terror Network., , , , , , , , , and . Mining Social Networks and Security Informatics, Springer, (2013)Robust integrated framework for effective feature selection and sample classification and its application to gene expression data analysis., , , , , , , , , and 3 other author(s). CIBCB, page 112-119. IEEE, (2012)TempoXML: Nested bitemporal relationship modeling and conversion tool for fuzzy XML., , , , and . Inf. Sci., (2012)Effective web log mining and online navigational pattern prediction., , , , , , and . Knowl. Based Syst., (2013)Simple and effective behavior tracking by post processing of association rules into segments., , , , , , and . iiWAS, page 296-300. ACM, (2011)Graph-based approach for outlier detection in sequential data and its application on stock market and weather data., , , , , , , and . Knowl. Based Syst., (2014)The Power of Social Network Construction and Analysis for Knowledge Discovery in the Medical Referral Process., , , , , , , and . J. Organ. Comput. Electron. Commer., 24 (2-3): 186-214 (2014)Applications of Social Network Construction and Analysis in the Medical Referral Process., , , , , and . DASC, page 816-823. IEEE Computer Society, (2011)