Author of the publication

Framework for mining regular patterns in dynamic networks.

, , , and . Int. J. Knowl. Eng. Data Min., 3 (3/4): 299-314 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Regular Patterns in Weighted-Directed Networks., , and . ICIT, page 215-220. IEEE, (2014)CDIS: Circle Density Based Iris Segmentation., , , and . IC3, volume 40 of Communications in Computer and Information Science, page 295-306. Springer, (2009)Hybrid Cloud Support for Large Scale Analytics and Web Processing., , , , and . WebApps, page 39-50. USENIX Association, (2012)Text Summarisation Using Laplacian Centrality-Based Minimum Vertex Cover., and . J. Inf. Knowl. Manag., 18 (4): 1950050:1-1950050:20 (2019)CDIA-DS: A framework for efficient reconstruction of compound document image using data structure., , , and . IC3, page 1-7. IEEE Computer Society, (2016)Malafide Intension Based Detection of Privacy Violation in Information System., , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 365-368. Springer, (2006)Preserving Obliviousness Characteristic of Honeypot database., , , , and . COMAD, page 72-79. Tata McGraw-Hill Publishing Company Limited, (2006)Multi-class instance-incremental framework for classification in fully dynamic graphs., , , and . Int. J. Comput. Sci. Eng., 21 (1): 69-83 (2020)Practical Optimal Caching Using Multiple Virtual Caches in Multiple Query Optimization., , and . IMTIC, volume 20 of Communications in Computer and Information Science, page 366-377. Springer, (2008)InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices., , and . IC3, volume 40 of Communications in Computer and Information Science, page 637-648. Springer, (2009)