From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of New Malicious Code Using N-grams Signatures., , , и . PST, стр. 193-196. (2004)MATHMASTER: an Alternative Math Word Problems Translation., , и . Computational Approaches to Assistive Technologies for People with Disabilities, том 253 из Frontiers in Artificial Intelligence and Applications, IOS Press, (2013)Efficient image retrieval in DCT domain by hypothesis testing., , и . ICIP, стр. 225-228. IEEE, (2009)Distributed parallel compilation of MSBNs., и . Concurr. Comput. Pract. Exp., 21 (12): 1607-1631 (2009)A Message to TCDE Members., , и . IEEE Data Eng. Bull., 14 (3): 1 (1991)A framework for computing extrasentential references., и . Comput. Intell., (1986)Keyword Extraction Strategy for Item Banks Text Categorization., , , и . Comput. Intell., 23 (1): 28-44 (2007)Data bases and knowledge representation for literary and linguistic studies., и . Comput. Humanit., 17 (3): 121-137 (1983)Integrating artificial intelligence into literary research: An invitation to discuss design specifications., и . Comput. Humanit., 19 (4): 235-243 (1985)Granular Concept Mapping and Applications., , и . Rough Sets and Intelligent Systems (1), том 42 из Intelligent Systems Reference Library, Springer, (2013)