From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evolutionary divide-and-conquer approach to inferring S-system models of genetic networks., , , и . Congress on Evolutionary Computation, стр. 691-698. IEEE, (2005)On the Design of Optimization Algorithms for Prediction of Molecular Interactions., , , и . BIBE, стр. 208-215. IEEE Computer Society, (2009)Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation., , , , , и . Soft Comput., 21 (11): 2883-2896 (2017)AD2: Anomaly detection on active directory log data for insider threat monitoring., , , , и . ICCST, стр. 287-292. IEEE, (2015)On the Design of Optimization Algorithms for Prediction of Molecular Interactions., , , и . Int. J. Artif. Intell. Tools, 19 (3): 267-280 (2010)iF2: An Interpretable Fuzzy Rule Filter for Web Log Post-Compromised Malicious Activity Monitoring., , , и . AsiaJCIS, стр. 130-137. IEEE Computer Society, (2015)Interpretable gene expression classifier with an accurate and compact fuzzy rule base for microarray data analysis, , , и . Biosystems, 85 (3): 165--176 (сентября 2006)Inference of S-system Models for Large-Scale Genetic Networks., , и . ICDE Workshops, стр. 1155. IEEE Computer Society, (2005)Towards better measurement of attention and satisfaction in mobile search., , , и . SIGIR, стр. 113-122. ACM, (2014)Data classification with a generalized Gaussian components based density estimation algorithm., , и . IJCNN, стр. 1259-1266. IEEE Computer Society, (2009)