Author of the publication

Mining Redundant Industrial Alarm Occurrences with Association Rules Extraction and Complex Networks Modeling.

, , and . SEDE, page 281-288. ISCA, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rank-Preserving Two-Level Caching for Scalable Search Engines., , , , , and . SIGIR, page 51-58. ACM, (2001)Enhancement of Epidemiological Models for Dengue Fever Based on Twitter Data., , , , and . DH, page 109-118. ACM, (2017)Simulations of Complex and Microscopic Models of Cardiac Electrophysiology Powered by Multi-GPU Platforms., , , , and . Comput. Math. Methods Medicine, (2012)Mining Attribute-structure Correlated Patterns in Large Attributed Graphs., , and . Proc. VLDB Endow., 5 (5): 466-477 (2012)Isofunctional Protein Subfamily Detection Using Data Integration and Spectral Clustering., , and . PLoS Comput. Biol., (2016)Quantifying the Performability of Cluster-Based Services., , , , , and . IEEE Trans. Parallel Distributed Syst., 16 (5): 456-467 (2005)The Metric Dilemma: Competence-Conscious Associative Classification., , , and . SDM, page 918-929. SIAM, (2009)Using Structural Signatures for Identifying Globins: the Intra-Subunit Electrostatic Interactions., , , , , , , and . WOB, page 157-160. (2003)Efficient, Accurate and Privacy-Preserving Data Mining for Frequent Itemsets in Distributed Databases., , , and . SBBD, page 281-292. UFAM, (2003)Performance Analysis of WWW Cache Proxy Hierarchies., , , and . J. Braz. Comp. Soc., (1998)