Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-clustering for identification of customer purchase behaviours., and . EGC, volume RNTI-E-19 of Revue des Nouvelles Technologies de l'Information, page 109-114. Cépaduès-Éditions, (2010)Structural analysis of handwritten mathematical expressions through fuzzy parsing., , and . ACST, page 151-156. IASTED/ACTA Press, (2006)A data mining-based solution for detecting suspicious money laundering cases in an investment bank., , and . CoRR, (2016)Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results., , , and . Digital Investigation, 10 (1): 34-43 (2013)An agent-based negotiation approach for knowledge exchange in cloud service platforms., , and . ICSDM, page 22-27. IEEE, (2015)CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool., , , and . SimuTools, page 126-131. ICST/ACM, (2014)On the recognition of online handwritten mathematics using feature-based fuzzy rules and relationship precedence., and . FUZZ-IEEE, page 1641-1646. IEEE, (2008)Toward a Distributed Knowledge Discovery system for Grid systems., , and . CoRR, (2017)Internet of things forensics: Challenges and Case Study., , , and . CoRR, (2018)Distributed Clustering Algorithm for Spatial Data Mining., and . CoRR, (2018)