Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient WordNet-Based Summarization for Large Text Documents, and . UNSW-CSE-TR-0311. School of Computer Science and Engineering, University of New South Wales, (2003)Twitter user geolocation by filtering of highly mentioned users., , , and . J. Assoc. Inf. Sci. Technol., 69 (7): 879-889 (2018)Real-Time Stream Mining Electric Power Consumption Data Using Hoeffding Tree with Shadow Features., , , , and . ADMA, volume 10086 of Lecture Notes in Computer Science, page 775-787. (2016)Web Service Orchestration Topic Mining., , , and . ICWS, page 225-232. IEEE Computer Society, (2014)Online Role Mining without Over-Fitting for Service Recommendation., , and . ICWS, page 58-65. IEEE Computer Society, (2013)Privacy Scoring of Social Network Users as a Service., , and . SCC, page 218-225. IEEE Computer Society, (2015)Hierarchical Clustering Using Homogeneity as Similarity Measure for Big Data Analytics., , , , , and . SCC, page 348-354. IEEE Computer Society, (2015)Scalable Sentiment Analysis for Microblogs Based on Semantic Scoring., , , , and . SCC, page 271-278. IEEE Computer Society, (2015)Adaptive Distance Measurement for Time Series Databases., and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 598-610. Springer, (2007)Towards end-to-end privacy control in the outsourcing of marketing activities: a web service integration solution., , , , , , , , , and . ICEC, volume 113 of ACM International Conference Proceeding Series, page 454-461. ACM, (2005)