Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic Artifacts of Microsoft Windows Vista System., and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 304-319. Springer, (2008)Parallel Simulated Annealing for Efficient Data Clustering., , and . DEXA, page 244-249. Springer-Verlag, Wien, (1992)A Heuristic Information Retrieval Model on a Massively Parallel Processor., , and . ICDE, page 365-372. IEEE Computer Society, (1995)On Random Sampling for Parallel Simulated Annealing., , and . IPPS, page 253-257. IEEE Computer Society, (1994)Efficient mining of strongly correlated item pairs., , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6241 of SPIE Proceedings, page 624102. SPIE, (2006)Detecting outliers in interval data., , and . ACM Southeast Regional Conference, page 290-295. ACM, (2006)Incorporating Latent Semantic Indexing into a Neural Network Model for Information Retrieval., , and . CIKM, page 145-153. ACM, (1996)From digital forensic report to Bayesian network representation., , and . ISI, page 303-306. IEEE, (2009)Locality-Based Server Profiling for Intrusion Detection., and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 205-216. Springer, (2008)A non-linear dimensionality-reduction technique for fast similarity search in large databases., , , and . SIGMOD Conference, page 527-538. ACM, (2006)