Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A PSO-Based Feature Subset Selection for Application of Spam /Non-spam Detection., , , , and . M-CAIT, volume 378 of Communications in Computer and Information Science, page 183-193. Springer, (2013)A Bibliometric Analysis of Human Action Recognition., , , , and . IntelliSys (1), volume 15 of Lecture Notes in Networks and Systems, page 419-427. Springer, (2016)An intelligent case-based supplier selection framework: customer knowledge management perspective., , , and . CAMP, page 95-99. IEEE, (2012)MMSLDI: a distributed data integration system., , , and . iiWAS, page 895-898. ACM, (2010)Temporal Based Factorization Approach for Solving Drift and Decay in Sparse Scoring Matrix., , , and . SCDM, volume 700 of Advances in Intelligent Systems and Computing, page 340-350. Springer, (2018)Data stream clustering by divide and conquer approach based on vector model., , and . J. Big Data, (2016)A Frequent Path Mining Algorithm to Intelligent Business Process Decomposition., , , and . SWWS, page 197-203. CSREA Press, (2009)A New Algorithm for Discovery Maximal Frequent Itemsets., , , and . DMIN, page 309-312. CSREA Press, (2008)An Improved Genetic Algorithm with Gene Value Representation and Short Term Memory for Shape Assignment Problem., , , , and . ICEIS (2), page 178-183. SciTePress, (2011)Enforcing Integrity for Redundant and Contradiction Constraints in OODBs., , , and . CITA, page 256-261. (2005)