Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New approaches to constrained optimization of digital filters., , , , , and . ISCAS, page 80-83. IEEE, (1993)Extraction of Features with Unstructured Representation from HTML Documents., , , and . ICWI, page 47-53. IADIS, (2002)Spam Detection: A Syntax and Semantic-based Approach., , , and . IKE, page 354-360. CSREA Press, (2006)A Scheme for Approximate Matching Event Announcements to a Customer Database., and . ICWI, page 123-130. IADIS, (2004)A Scheduler ASIC for a Programmable Packet Switch., , , , and . IEEE Micro, 20 (1): 42-48 (2000)Realistic wave conditions and their influence on quantifying the tidal stream energy resource, , , and . Applied Energy, (December 2014)A diagnostic system based on a multi-decision approximate rules model., , , , and . SAC, page 20-24. ACM, (1997)An Android Based Medication Reminder System: A Concept Analysis Approach., , and . ICCS, volume 6828 of Lecture Notes in Computer Science, page 315-322. Springer, (2011)A neural network as a quality control monitor of an intelligent system., , and . SAC, page 263-266. ACM, (1995)Conflict resolution in inductive learning from examples., , , and . SAC, page 598-602. ACM, (1992)