Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance., and . Knowl. Inf. Syst., 10 (3): 333-355 (2006)A Framework for Efficient Association Rule Mining in XML Data., , , , and . J. Database Manag., 17 (3): 19-40 (2006)Image Mining: Trends and Developments., , and . J. Intell. Inf. Syst., 19 (1): 7-23 (2002)Pose-Free Structure From Motion Using Depth From Motion Constraints., , and . IEEE Trans. Image Processing, 20 (10): 2937-2953 (2011)A Novel Differential Privacy Recommendation Method Based on a Distributed Framework., , , , and . ICDM Workshops, page 1332-1339. IEEE, (2018)Channel Aware Opportunistic Routing in Multi-Radio Multi-Channel Wireless Mesh Networks., , , , and . J. Comput. Sci. Technol., 29 (3): 487-501 (2014)Quantitative Evaluation of Two-Factor Analysis Applied to Hepatic Perfusion Study Using Contrast-enhanced Ultrasound., , , and . IEEE Trans. Biomed. Eng., 60 (2): 259-267 (2013)Efficient and Effective Filtering of Duplication Detection in Large Database Applications.. J. Softw., 7 (11): 2424-2436 (2012)Protograph-Based Globally-Coupled LDPC Codes Over the Gaussian Channel With Burst Erasures., , , , and . IEEE Access, (2019)Tail-Biting Globally-Coupled LDPC Codes., , , , and . IEEE Trans. Commun., 67 (12): 8206-8219 (2019)