Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Boosting Genetic Fuzzy Classifier for Intrusion Detection Using Data Mining Techniques for Rule Pre-screening., , and . HIS, volume 105 of Frontiers in Artificial Intelligence and Applications, page 983-992. IOS Press, (2003)Genetic algorithms based approach to database vertical partition., , and . J. Intell. Inf. Syst., 26 (2): 167-183 (2006)Automated Product Recommendation by Employing Case-Based Reasoning Agents., , and . ICEIS (2), page 515-518. (2004)Periodicity detection in turkish stock market., , , , and . SIU, page 1-4. IEEE, (2018)An adaptive energy efficient cache invalidation scheme for mobile databases., and . SAC, page 1122-1126. ACM, (2006)Framework for mining web content outliers., , and . SAC, page 590-594. ACM, (2004)ConvRel: relationship conversion to XML nested structures., , and . SAC, page 698-702. ACM, (2004)Utilising Neural Network and Support Vector Machine for gene Expression Classification., , , , and . J. Inf. Knowl. Manag., 6 (4): 251-260 (2007)Evaluating predictive performance of network biomarkers with network structures., , , , , , and . J. Bioinform. Comput. Biol., (2014)A framework for representing navigational patterns as full temporal objects., , and . SIGecom Exch., 5 (2): 23-33 (2004)