Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting the effectiveness of pattern-based entity extractor inference., , , and . Appl. Soft Comput., (2016)Active Learning of Regular Expressions for Entity Extraction., , , and . IEEE Trans. Cybern., 48 (3): 1067-1080 (2018)Automatic Synthesis of Regular Expressions from Examples., , , , and . Computer, 47 (12): 72-80 (2014)Data Quality Challenge: Toward a Tool for String Processing by Examples., , , and . ACM J. Data Inf. Qual., 6 (4): 13:1-13:4 (2015)Active learning approaches for learning regular expressions with genetic programming., , , and . SAC, page 97-102. ACM, (2016)Semisupervised Wrapper Choice and Generation for Print-Oriented Documents., , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 208-220 (2014)A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection., , and . SEC, volume 278 of IFIP, page 711-716. Springer, (2008)A Framework for Large-Scale Detection of Web Site Defacements., , and . ACM Trans. Internet Techn., 10 (3): 10:1-10:37 (2010)Compressing Regular Expression Sets for Deep Packet Inspection., , , and . PPSN, volume 8672 of Lecture Notes in Computer Science, page 394-403. Springer, (2014)Efficient Verification of a Multicast Protocol for Mobile Computing., , , and . Comput. J., 44 (1): 21-30 (2001)