Author of the publication

Database Selection and Keyword Search of Structured Databases: Powerful Search for Naive Users.

, , , and . IRI, page 175-182. IEEE Systems, Man, and Cybernetics Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Importance of Terrorists in a Terror Network., , , , , , , , , and . Mining Social Networks and Security Informatics, Springer, (2013)A Fully Reversible Data Transform Technique Enhancing Data Compression of SMILES Data., and . CD-ARES, volume 8127 of Lecture Notes in Computer Science, page 54-68. Springer, (2013)Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer Biomarkers., , , , , , , , , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)Verification, Validation and Integrity in Knowledge and Database Systems: Future Directions., , and . EUROVAV, page 297-312. Kluwer, (1999)Data governance in predictive toxicology: A review., , , , and . J. Cheminformatics, (2011)Promoting where, when and what? An analysis of web logs by integrating data mining and social network techniques to guide ecommerce business promotions., , , , , and . Soc. Netw. Anal. Min., 1 (3): 173-185 (2011)Formal Specification of Multi Agent System for Historical Information Retrieval from Online Social Networks., , , and . KES-AMSTA, volume 6682 of Lecture Notes in Computer Science, page 84-93. Springer, (2011)Finding Hidden Nodes by Checking for Missing Nodes against Past Social Networks., , , , , , and . NBiS, page 239-246. IEEE Computer Society, (2012)Effective web log mining and online navigational pattern prediction., , , , , , and . Knowl. Based Syst., (2013)Using Pareto points for model identification in predictive toxicology., , and . J. Cheminformatics, (2013)