Author of the publication

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts.

, , , , , and . ICMLA (2), page 60-65. IEEE, (2013)978-0-7695-5144-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Query generation in an instructional database management system., and . SIGCSE, page 19-25. ACM, (1987)Creation of a Student Research Environment in Artificial Intelligence with Industrial Involvement., , , , , and . FLAIRS, page 146-149. AAAI Press, (2016)An Approach to Schema Integration and Query Formulation in Federated Database Systems., , and . ICDE, page 477-484. IEEE Computer Society, (1987)Automatic Generation of Ontology based Annotations in XML and Their Use in Retrieval Systems., , , , and . WISE, page 296-301. IEEE Computer Society, (2000)A Deductive Database System with Applications to Route Planning., and . DEXA, page 60-66. Springer-Verlag, Wien, (1991)Using a Semantic Model and XML for Document Annotation., and . IEA/AIE, volume 1821 of Lecture Notes in Computer Science, page 236-241. Springer, (2000)Graphical Specification of Recursive Queries., , and . ICCI, volume 497 of Lecture Notes in Computer Science, page 252-263. Springer, (1991)Recursive Query Specification Using Nested Databases.. SEKE, page 140-145. Knowledge Systems Institute, (1989)Use of Multi-level State Diagrams for Robot Cooperation in an Indoor Environment., , and . ICDIPC (2), volume 189 of Communications in Computer and Information Science, page 411-425. Springer, (2011)Models in teaching programming languages (abstract only)., and . ACM Conference on Computer Science, page 424. ACM, (1985)