Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robot-assisted mirror ultrasound scanning for deep venous thrombosis detection using RGB-D sensor., , , , , and . Multimedia Tools Appl., 75 (22): 14247-14261 (2016)Web Services Based Wagering System for the Best Odds., , and . IASSE, page 242-245. ISCA, (2003)Comparison of Agglomerative and Partitional Document Clustering Algorithms, and . 02-014. (2002)Towards learning segmented temporal sequences: A decision tree approach., , and . ICMLC, page 145-150. IEEE, (2015)Abnormal Subspace Sparse PCA for Anomaly Detection and Interpretation., , and . CoRR, (2016)Achieving business agility with WebSphere ILOG JRules and WebSphere BPM., , and . CASCON, page 360-362. ACM, (2010)Effective Pre-retrieval Query Performance Prediction Using Similarity and Variability Evidence., , and . ECIR, volume 4956 of Lecture Notes in Computer Science, page 52-64. Springer, (2008)Predicting Disk Failures with HMM- and HSMM-Based Approaches., , , and . ICDM, volume 6171 of Lecture Notes in Computer Science, page 390-404. Springer, (2010)RSATree: Distribution-Aware Data Representation of Large-Scale Tabular Datasets for Flexible Visual Query., , , , , , , and . IEEE Trans. Vis. Comput. Graph., 26 (1): 1161-1171 (2020)Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern., , , , , , and . Inf., 10 (8): 262 (2019)