Author of the publication

Mining Regression Rules and Regression Trees.

, , and . PAKDD, volume 1394 of Lecture Notes in Computer Science, page 271-282. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic packet marking with non-preemptive compensation., , and . IEEE Communications Letters, 8 (6): 359-361 (2004)Secure Access Control Method for Wireless Sensor Networks., , , , and . IJDSN, (2015)A Fast Algorithm of Cubic Convolution Spline Interpolation for Image Compression., and . IMSA, page 1-5. IASTED/ACTA Press, (1999)Mining Regression Rules and Regression Trees., , and . PAKDD, volume 1394 of Lecture Notes in Computer Science, page 271-282. Springer, (1998)An Image Authentication and Recovery Method Using Optimal Selection of Block Types., , and . ISM, page 151-154. IEEE Computer Society, (2014)Error Rate-Based Dynamic Weighted Fair Queuing In Wireless Networks., , , and . LCN, page 546-553. IEEE Computer Society, (2005)A PTC Scheme for Internet of Things: Private-Trust-Confidentiality., , , and . AINA Workshops, page 969-974. IEEE Computer Society, (2016)Digital watermarking using zerotree of DCT., and . IEEE Trans. Consumer Electronics, 46 (1): 87-94 (2000)Applying projection and B-spline to image authentication and remedy., and . IEEE Trans. Consumer Electronics, 49 (4): 1234-1239 (2003)A robust watermarking technique based on the polarity relationship between blocks., , and . ICNSC, page 340-343. IEEE, (2015)