Author of the publication

On Mining Web Access Logs.

, and . ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, page 63-69. (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge detection in range images through morphological residue analysis., and . CVPR, page 630-632. IEEE, (1992)On Mining Web Access Logs., and . ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, page 63-69. (2000)Network Based Multi-Bot Awareness., , , , , , , , , and 5 other author(s). COMSNETS, page 138-139. IEEE, (2021)Fuzzy targeting of customers based on product attributes., , , and . FUZZ-IEEE, page 35-40. IEEE, (2002)A belief maintenance scheme for hierarchical knowledge-based image analysis systems.. Int. J. Intell. Syst., 6 (7): 699-715 (1991)Interpretable Hierarchical Clustering by Constructing an Unsupervised Decision Tree., and . IEEE Trans. Knowl. Data Eng., 17 (1): 121-132 (2005)Network Emulation For Tele-driving Application Development, , , , , , , , , and . 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS), page 109-110. (2021)A comparison of Gaussian and Pearson mixture modeling for pattern recognition and computer vision applications., and . Pattern Recognit. Lett., 20 (3): 305-313 (1999)A Fuzzy Approach to Content-Based Image Retrieval., and . ICMCS, Vol. 2, page 964-968. IEEE Computer Society, (1999)0-7695-0253-9.Neural and Fuzzy Methods in Handwriting Recognition., , , , and . Computer, 30 (2): 79-86 (1997)