Author of the publication

Automatic Face Annotation in News Images by Mining the Web.

, , , and . Web Intelligence, page 47-54. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection., , and . SEC, volume 278 of IFIP, page 711-716. Springer, (2008)Active learning approaches for learning regular expressions with genetic programming., , , and . SAC, page 97-102. ACM, (2016)A Framework for Large-Scale Detection of Web Site Defacements., , and . ACM Trans. Internet Techn., 10 (3): 10:1-10:37 (2010)Semisupervised Wrapper Choice and Generation for Print-Oriented Documents., , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 208-220 (2014)Compressing Regular Expression Sets for Deep Packet Inspection., , , and . PPSN, volume 8672 of Lecture Notes in Computer Science, page 394-403. Springer, (2014)Road Traffic Rules Synthesis Using Grammatical Evolution., , and . EvoApplications (2), volume 10200 of Lecture Notes in Computer Science, page 173-188. (2017)Communication-based cooperative tasks: how the language expressiveness affects reinforcement learning., , and . SAC, page 898-905. ACM, (2019)Fault-tolerant support for reliable multicast in Mobile Wireless Systems: Design and Evaluation., , and . Wireless Networks, 10 (3): 259-269 (2004)Efficient Verification of a Multicast Protocol for Mobile Computing., , , and . Comput. J., 44 (1): 21-30 (2001)(In)Secure Configuration Practices of WPA2 Enterprise Supplicants., , , and . ARES, page 37:1-37:6. ACM, (2018)