Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semisupervised Wrapper Choice and Generation for Print-Oriented Documents., , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 208-220 (2014)Efficient Verification of a Multicast Protocol for Mobile Computing., , , and . Comput. J., 44 (1): 21-30 (2001)(In)Secure Configuration Practices of WPA2 Enterprise Supplicants., , , and . ARES, page 37:1-37:6. ACM, (2018)Active learning approaches for learning regular expressions with genetic programming., , , and . SAC, page 97-102. ACM, (2016)A Framework for Large-Scale Detection of Web Site Defacements., , and . ACM Trans. Internet Techn., 10 (3): 10:1-10:37 (2010)A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection., , and . SEC, volume 278 of IFIP, page 711-716. Springer, (2008)Predicting the effectiveness of pattern-based entity extractor inference., , , and . Appl. Soft Comput., (2016)Data Quality Challenge: Toward a Tool for String Processing by Examples., , , and . ACM J. Data Inf. Qual., 6 (4): 13:1-13:4 (2015)Automatic Synthesis of Regular Expressions from Examples., , , , and . Computer, 47 (12): 72-80 (2014)Active Learning of Regular Expressions for Entity Extraction., , , and . IEEE Trans. Cybern., 48 (3): 1067-1080 (2018)