Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain Structures in Filtering Irrelevant Frequent Patterns., and . KDID, page 50-60. Helsinki University Printing House, Helsinki, (2002)Queryable Lossless Log Database Compression., , , and . KDID, page 70-79. Rudjer Boskovic Institute, Zagreb, Croatia, (2003)Interactive exploration of interesting findings in the Telecommunication Network Alarm Sequence Analyzer (TASA)., , and . Inf. Softw. Technol., 41 (9): 557-567 (1999)Knowledge Discovery from Telecommunication Network Alarm Databases., , , , and . ICDE, page 115-122. IEEE Computer Society, (1996)Comprehensive Log Compression with Frequent Patterns., , , , and . DaWaK, volume 2737 of Lecture Notes in Computer Science, page 360-370. Springer, (2003)TASA: Telecommunication Alarm Sequence Analyzer or how to enjoy faults in your network., , , , and . NOMS, page 520-529. IEEE, (1996)Invited Paper: Solutions for a Service Architecture in Pervasive Environments Based on WWRF WG2 Requirements, , and . International Symposium on Applications and the Internet Workshops, page 1-6. Hiroshima, Japan, IEEE, (January 2007)Remarks on the Industrial Application of Inductive Database Technologies., , and . Constraint-Based Mining and Inductive Databases, volume 3848 of Lecture Notes in Computer Science, page 196-215. Springer, (2004)Querying Inductive Databases: A Case Study on the MINE RULE Operator., , and . PKDD, volume 1510 of Lecture Notes in Computer Science, page 194-202. Springer, (1998)Modeling KDD Processes within the Inductive Database Framework., , and . DaWaK, volume 1676 of Lecture Notes in Computer Science, page 293-302. Springer, (1999)