From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Composite Bit-Sliced Signature File: An Efficient Access Method for Set-Valued Object Retrieval., и . CODAS, стр. 542-549. World Scientific, (1996)Compressed Vector Set: A Fast and Space-Efficient Data Mining Framework., , , , , и . J. Inf. Process., (2018)Efficient distance-based outlier detection on uncertain datasets of Gaussian distribution., и . World Wide Web, 17 (4): 511-538 (2014)Important scene analysis model using result importance and situation importance., , , и . Int. J. Wirel. Mob. Comput., 3 (4): 225-235 (2009)Social Bookmarking Induced Active Page Ranking., , и . IEICE Trans. Inf. Syst., 93-D (6): 1403-1413 (2010)Passerby Crowdsourcing: Workers' Behavior and Data Quality Management., , , , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (4): 169:1-169:20 (2018)Algorithms for structure-based grouping in XML-OLAP., , и . Int. J. Web Inf. Syst., 5 (2): 122-150 (2009)Faceted Navigation Framework for XML Data., , и . Int. J. Web Inf. Syst., 8 (4): 348-370 (2012)Evaluation of Signature Files as Set Access Facilities in OODBs., , и . SIGMOD Conference, стр. 247-256. ACM Press, (1993)TLV-Bandit: Bandit Method for Collecting Topic-related Local Tweets., и . MIPR, стр. 56-62. IEEE, (2021)