Author of the publication

Connecting the Dots in a Concept Space by Iterative Reading of Freetext References with Wordnet.

, , and . WI-IAT (1), page 441-444. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehension Approach for Formalizing Privacy Rules of HIPAA for Decision Support., , and . ICMLA (2), page 390-395. IEEE, (2013)978-0-7695-5144-9.Guest editor's introduction to the special issue on activated and programmable internet: converging technologies for internet based active and programmable systems.. Comput. Commun., 28 (6): 589-590 (2005)A phenotype reputation estimation function and its study of resilience to social attacks., and . J. Netw. Comput. Appl., 32 (4): 913-924 (2009)Computing in social networks with relationship algebra., and . J. Netw. Comput. Appl., 31 (4): 862-878 (2008)Semantic Graph Transitivity for Discovering Bloom Taxonomic Relationships between Knowledge Units in a Text, , , and . (2016)Conceptualize the Domain Knowledge Space in the Light of Cognitive Skills., and . CSEDU (1), page 285-295. SciTePress, (2015)Formalism for Hierarchical Organization and Flexible Abstraction of Program Knowledge., and . SEKE, page 301-303. Knowledge Systems Institute, (1993)An Empirical Study on the Potential of Search Parallelism on MIMD Architecture., and . IJCSLP Workshop on Concurrent and Parallel Implementations, (1992)Jitter and delay reduction for time sensitive elastic traffic for TCP-interactive based world wide video streaming over ABone., and . ICCCN, page 311-316. IEEE, (2003)Identifying and Modeling Security Threats for IoMT Edge Network using Markov Chain and Common Vulnerability Scoring System (CVSS)., and . CoRR, (2021)