Author of the publication

Computing Entropy for Ortholog Detection.

, and . International Conference on Computational Intelligence, page 89-92. International Computational Intelligence Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An RSVM based two-teachers-one-student semi-supervised learning algorithm., , and . Neural Networks, (2012)Game Bot Detection via Avatar Trajectory Analysis., , and . IEEE Trans. Comput. Intellig. and AI in Games, 2 (3): 162-175 (2010)Group Behavior Recognition Based on Dictionary and Hierarchical Learning., , and . INNS Conference on Big Data, volume 144 of Procedia Computer Science, page 52-59. Elsevier, (2018)Efficient spear-phishing threat detection using hypervisor monitor., , , , and . ICCST, page 299-303. IEEE, (2015)An efficient scheduling algorithm for scalable video streaming over P2P networks., , , and . Comput. Networks, 57 (14): 2856-2868 (2013)Efficient dynamic malware analysis using virtual time control mechanics., , and . Comput. Secur., (2018)User Behaviour Risk Evaluation in Zero Trust Architecture Environment., and . WF-IoT, page 1-6. IEEE, (2022)Extracting Explainable Deep Representation for Machine Tutoring., , and . IEEE BigData, page 4651-4658. IEEE, (2019)Sensor Reading Prediction Using Anisotropic Kernel Gaussian Process Regression., and . iThings/GreenCom/CPSCom, page 207-214. IEEE Computer Society, (2014)ASAGeR: Automated Short Answer Grading Regressor via Sentence Simplification., , , and . ICKG, page 60-68. IEEE, (2023)