From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Email mining toolkit supporting law enforcement forensic analyses., и . DG.O, том 89 из ACM International Conference Proceeding Series, стр. 221-222. Digital Government Research Center, (2005)The PARULEL Parallel Rule Language., , и . ICPP (2), стр. 36-45. CRC Press, (1991)AdaCost: Misclassification Cost-Sensitive Boosting., , , и . ICML, стр. 97-105. Morgan Kaufmann, (1999)Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study., , , и . DG.O, Digital Government Research Center, (2003)Behavior Profiling of Email., , , , и . ISI, том 2665 из Lecture Notes in Computer Science, стр. 74-90. Springer, (2003)Behavior-based modeling and its application to Email analysis., , , , , и . ACM Trans. Internet Techn., 6 (2): 187-221 (2006)Extracting context to improve accuracy for HTML content extraction., , и . WWW (Special interest tracks and posters), стр. 1114-1115. ACM, (2005)Adaptive Anomaly Detection via Self-calibration and Dynamic Updating., , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 41-60. Springer, (2009)Anomalous Payload-Based Worm Detection and Signature Generation., , и . RAID, том 3858 из Lecture Notes in Computer Science, стр. 227-246. Springer, (2005)Return Value Predictability Profiles for Self-healing., , , , и . IWSEC, том 5312 из Lecture Notes in Computer Science, стр. 152-166. Springer, (2008)