Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Fault Localization Using N-gram Analysis., , , , and . WASA, volume 5258 of Lecture Notes in Computer Science, page 548-559. Springer, (2008)Automatic Ontology Derivation Using Clustering for Image Classification., and . Multimedia Information Systems, page 56-65. Arizona State University, (2002)Pseudo-Label Generation for Multi-Label Text Classification., , and . CIDU, page 60-75. NASA Ames Research Center, (2011)Multimodal concept fusion using semantic closeness for image concept disambiguation., , , and . Multim. Tools Appl., 61 (1): 69-86 (2012)Geospatial Resource Description Framework (GRDF) and security constructs., , and . Comput. Stand. Interfaces, 33 (1): 35-41 (2011)Secure data processing for IoT middleware systems., , , , , and . J. Supercomput., 75 (8): 4684-4709 (2019)Secure Real-Time Heterogeneous IoT Data Management System., , , and . TPS-ISA, page 228-235. IEEE, (2019)A Novel Application of a Semi-Supervised Learning Approach to Identify Choroidal Tumors in Fundus Photographs., , , , , and . CogMI, page 132-139. IEEE, (2021)Cross-Domain Sentiment Classification with Attention-Assisted GAN., , , and . CogMI, page 88-95. IEEE, (2021)Tweets mining using WIKIPEDIA and impurity cluster measurement., , and . ISI, page 141-143. IEEE, (2010)