Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Boosting Genetic Fuzzy Classifier for Intrusion Detection Using Data Mining Techniques for Rule Pre-screening., , and . HIS, volume 105 of Frontiers in Artificial Intelligence and Applications, page 983-992. IOS Press, (2003)A Web-Based Ontology Browsing and Editing System, , , , , , , and . Conference on Innovative Applications of Artificial Intelligence, AAAI, (July 2002)Genetic algorithms based approach to database vertical partition., , and . J. Intell. Inf. Syst., 26 (2): 167-183 (2006)Reliable Transaction Execution in Multidatabase Systems., and . RIDE-IMS, page 344-347. IEEE Computer Society, (1991)Semi-Automatic Recognition of Noun Modifier Relationships, , and . Proceedings of the Thirty-Sixth Annual Meeting of the Association for Computational Linguistics and Seventeenth International Conference on Computational Linguistics, page 96--102. San Francisco, California, Association for Computational Linguistics, Morgan Kaufmann Publishers, (1998)Project Halo: Towards a Digital Aristotle, , , , , , , , , and 12 other author(s). AI Magazine, 25 (4): 29-48 (2004)Web outlier mining: Discovering outliers from web datasets., , and . Intell. Data Anal., 9 (5): 473-486 (2005)Redeem with privacy (RWP): privacy protecting framework for geo-social commerce., and . WPES, page 189-200. ACM, (2013)A Horizontal Fragmentation Algorithm for the Fact Relation in a Distributed Data Warehouse., and . CIKM, page 154-161. ACM, (1999)Text summarization techniques: SVM versus neural networks., , , , , , , and . iiWAS, page 487-491. ACM, (2009)