Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Superimposing codes representing hierarchical information in web directories., and . WIDM, page 54-60. ACM, (2001)Extracting lists of data records from semi-structured web pages., , , , and . Data Knowl. Eng., 64 (2): 491-509 (2008)Advancing Network Flow Information Using Collaborative Filtering., , , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 25 (Supplement-2): 97-112 (2017)HOPE (High Order Profile Expansion) for the New User Problem on Recommender Systems., , , and . CIRCLE, volume 2621 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)Early Intrusion Detection for OS Scan Attacks., , , , and . NCA, page 1-5. IEEE, (2019)Experiencies Retrieving Information in the World Wide Web., and . ISCC, page 72-79. IEEE Computer Society, (2001)Improving k-nearest neighbors algorithms: practical application of dataset analysis., , , and . CIKM, page 2253-2256. ACM, (2011)Search shortcuts using click-through data., , , , , and . WSCD@WSDM, page 48-55. ACM, (2009)The Spanish Web in Numbers - Main Features of the Spanish Hidden Web., , , and . KDIR, page 371-374. SciTePress, (2011)Measuring Early Detection of Anomalies., , , and . IEEE Access, (2022)