Author of the publication

Detecting operations that potentially violate well-formedness constraints for metadata repository systems.

, and . CCIS, page 212-219. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Motivational System for Mind Model CAM., , , and . AAAI Fall Symposia, AAAI Press, (2013)Swarm Intelligence Clustering Algorithm Based on Attractor., , , and . ICNC (3), volume 3612 of Lecture Notes in Computer Science, page 496-504. Springer, (2005)A Survey on Statistical Pattern Feature Extraction., , , , and . ICIC (2), volume 5227 of Lecture Notes in Computer Science, page 701-708. Springer, (2008)Supervised Feature Extraction Algorithm Based on Continuous Divergence Criterion., , and . ICIC (2), volume 4114 of Lecture Notes in Computer Science, page 268-277. Springer, (2006)A Multi-Agent System for Supporting Job-Shop Scheduling., , , and . CEEMAS, (1999)Exploiting structural similarity of log files in fault diagnosis for Web service composition., , , and . CAAI Trans. Intell. Technol., 1 (1): 61-71 (2016)On modeling MapReduce with granular computing., and . GrC, page 875-789. IEEE Computer Society, (2011)Tolerance Granular Computing based on incomplete information system., , and . GrC, page 501-506. IEEE Computer Society, (2009)A nonnegative matrix factorization framework for semi-supervised document clustering with dual constraints., , and . Knowl. Inf. Syst., 36 (3): 629-651 (2013)Incremental extreme learning machine based on deep feature embedded., , , and . Int. J. Machine Learning & Cybernetics, 7 (1): 111-120 (2016)