Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Over-Fitting and Error Detection for Online Role Mining., , and . Int. J. Web Serv. Res., 9 (4): 1-23 (2012)Predicting unusual energy consumption events from smart home sensor network by data stream mining with misclassified recall., , , , , and . J. Ambient Intell. Humaniz. Comput., 9 (4): 1197-1221 (2018)Finding approximate solutions of NP-hard optimization and TSP problems using elephant search algorithm., , , , , and . J. Supercomput., 72 (10): 3960-3992 (2016)Discovering sub-patterns from time series using a normalized cross-match algorithm., , , , , and . J. Supercomput., 72 (10): 3850-3867 (2016)RDF Knowledge Base Summarization by Inducing First-Order Horn Rules., , and . ECML/PKDD (2), volume 13714 of Lecture Notes in Computer Science, page 188-204. Springer, (2022)Weakly-Supervised Relation Extraction in Legal Knowledge Bases., , , and . ICADL, volume 11853 of Lecture Notes in Computer Science, page 263-270. Springer, (2019)Learning Data Quality Analytics for Financial Services., , and . PACIS, page 67. (2019)A Semi-supervised Learning Approach for Microblog Sentiment Classification., , , and . SmartCity, page 339-344. IEEE Computer Society, (2015)Privacy Preserving Information Dispersal in Social Networks Based on Disposition to Privacy., , and . SmartCity, page 372-377. IEEE Computer Society, (2015)Rare Event Prediction Using Similarity Majority Under-Sampling Technique., , , , , , and . SCDS, volume 788 of Communications in Computer and Information Science, page 23-39. Springer, (2017)