From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Predictive Model for Protein Function Using Modular Neural Approach., , , , и . ICAPR (1), том 3686 из Lecture Notes in Computer Science, стр. 400-409. Springer, (2005)A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents., и . WISE Workshops, том 4256 из Lecture Notes in Computer Science, стр. 94-103. Springer, (2006)Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , и . Sensors, 14 (7): 12937-12957 (2014)Implementation of OSD Security Framework and Credential Cache., , , и . GPC, том 4459 из Lecture Notes in Computer Science, стр. 666-671. Springer, (2007)Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees., , , , , и . KES (1), том 4692 из Lecture Notes in Computer Science, стр. 672-679. Springer, (2007)Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data., , , и . J. Inf. Sci. Eng., 30 (3): 787-817 (2014)Fast Extraction of Maximal Frequent Subtrees Using Bits Representation., , , и . J. Inf. Sci. Eng., 25 (2): 435-464 (2009)Processing Continuous Range Queries with Non-spatial Selections., , , и . MUSIC, том 274 из Lecture Notes in Electrical Engineering, стр. 31-38. Springer, (2013)Distributed File Discovery Protocol in Mobile Peer-to-Peer Networks., , и . NCM (1), стр. 335-340. IEEE Computer Society, (2008)A Data Sanitization Method for Privacy Preserving Data Re-publication., , , , и . NCM (2), стр. 28-31. IEEE Computer Society, (2008)978-0-7695-3322-3.