Author of the publication

Classify Blog Articles Using Queried Keywords.

, , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1062-1068. IOS Press, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem., , and . IEEE Trans. Knowl. Data Eng., 15 (6): 1552-1560 (2003)Classify Blog Articles Using Queried Keywords., , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1062-1068. IOS Press, (2014)A flexible delegation processor for web-based information systems., and . Comput. Stand. Interfaces, 27 (3): 241-256 (2005)Design and implementation of a fine-grained menu control processor for web-based information systems., and . Future Gener. Comput. Syst., 19 (7): 1105-1119 (2003)Automatically Categorizing Blog Articles Using Ontology Tree Built by DBpedia., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1229-1238. IOS Press, (2014)Ontology-based Dynamic Semantic Annotation for Social Image Retrieval., , and . MDM, page 337-341. IEEE, (2020)A Time-stamping Proxy Signature Scheme Using Time-stamping Service., and . Int. J. Netw. Secur., 2 (1): 43-51 (2006)Exploiting Semantic Connectivity in Redefined Data Representation for Image Retrieval., , and . BigMM, page 322-325. IEEE Computer Society, (2016)Finding keywords in blogs: Efficient keyword extraction in blog mining via user behaviors., , and . Expert Syst. Appl., 41 (2): 663-670 (2014)A Blog Clustering Approach Based on Queried Keywords., , and . ISBAST, page 1-9. IEEE, (2013)