Author of the publication

Data governance strategy: a key issue in building Enterprise Data Warehouse.

, , and . iiWAS, page 587-591. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object-oriented query language facilitating construction of new objects., and . Inf. Softw. Technol., 35 (9): 519-529 (1993)MCF: A tool to find multi-scale community profiles in biological networks., , , , , , and . Comput. Methods Programs Biomed., 112 (3): 665-672 (2013)Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series., , and . ICEIS (1), page 346-352. SciTePress, (2015)Early DDoS Detection Based on Data Mining Techniques., , and . WISTP, volume 8501 of Lecture Notes in Computer Science, page 190-199. Springer, (2014)Mapping rules for converting from ODL to XML schemas., , , , , and . iiWAS, page 307-316. ACM, (2010)Protein network-based Lasso regression model for the construction of disease-miRNA functional interactions., , , and . EURASIP J. Bioinformatics and Systems Biology, (2013)Improving reinforcement learning by using sequence trees., , and . Mach. Learn., 81 (3): 283-331 (2010)Integrating wavelets with clustering and indexing for effective content-based image retrieval., , , and . Knowl. Based Syst., (2012)Effectiveness of Support Vector Machine for Crime Hot-Spots Prediction., and . Applied Artificial Intelligence, 22 (5): 433-458 (2008)Genetic algorithms based approach to database vertical partition., , and . J. Intell. Inf. Syst., 26 (2): 167-183 (2006)