Author of the publication

All-Implicants Neural Networks for Efficient Boolean Function Representation.

, , , and . ICCC, page 82-86. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing a pool of rules for credit card fraud detection by a Game Theory based approach., , , , , and . Future Gener. Comput. Syst., (2020)Concept of Linguistic Variable-Based Fuzzy Ensemble Approach: Application to Interlaced HDTV Sequences., , , , , and . IEEE Trans. Fuzzy Syst., 17 (6): 1245-1258 (2009)Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 113-124. Springer, (2018)Dynamic Access Control to Semantics-Aware Streamed Process Logs., , , , and . J. Data Semant., 8 (3): 203-218 (2019)Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud., , and . SCC@AsiaCCS, page 67-74. ACM, (2017)A WOWA-based Aggregation Technique on Trust Values Connected to Metadata, , , and . (2006)ODDI - A Framework for Semi-automatic Data Integration., , , , and . ICEIS (1), page 15-24. (2008)Towards Model-Driven Big-Data-as-a-Service.. ENASE, page 9. SciTePress, (2016)3D Expressive Face Model-based Tracking Algorithm., , , and . SPPRA, page 111-116. IASTED/ACTA Press, (2006)RSVP-TE Based Impairments Collection Mechanism in DWDM Network., , , , and . EuropeComm, volume 16 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 74-82. Springer, (2009)