Author of the publication

PTM: probabilistic topic mapping model for mining parallel document collections.

, , , , and . CIKM, page 1653-1656. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proactive security for mobile messaging networks., and . Workshop on Wireless Security, page 95-104. ACM, (2006)Evolution of the Internet QoS and support for soft real-time applications., , and . Proc. IEEE, 91 (7): 1086-1104 (2003)Polygraph: System for Dynamic Reduction of False Alerts in Large-Scale IT Service Delivery Environments., , , , , and . USENIX Annual Technical Conference, USENIX Association, (2011)A Framework for Model-Based Continuous Improvement of Global IT Service Delivery Operations., , and . IEEE SCC (2), page 197-204. IEEE Computer Society, (2008)Priority-Based Routing with Strict Deadlines and Server Flexibility Under Uncertainty., , and . WSC, page 3181-3188. IEEE, (2009)Containment of network worms via per-process rate-limiting., , , , and . SecureComm, page 14. ACM, (2008)Sapphire: Statistical Characterization and Model-Based Adaptation of Networked Applications., , and . IEEE Trans. Parallel Distributed Syst., 17 (12): 1512-1525 (2006)On Mobile Viruses Exploiting Messaging and Bluetooth Services., and . SecureComm, page 1-10. IEEE, (2006)IP Easy-pass: Edge Resource Access Control., , , and . INFOCOM, page 2583-2593. IEEE, (2004)IP Easy-pass: a light-weight network-edge resource access control., , , and . IEEE/ACM Trans. Netw., 13 (6): 1247-1260 (2005)