Author of the publication

A Genetic Algorithms-Based Approach for Optimizing Similarity Aggregation in Ontology Matching.

, , , , and . IWANN (1), volume 7902 of Lecture Notes in Computer Science, page 435-444. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Experiments on Early Detection of Depression., , , and . CLEF (Working Notes), volume 2125 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Qerberos: A Protocol for Secure Distribution of QRNG Keys., , , , , and . CSR, page 36-41. IEEE, (2023)Advancing Network Flow Information Using Collaborative Filtering., , , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 25 (Supplement-2): 97-112 (2017)A Genetic Algorithms-Based Approach for Optimizing Similarity Aggregation in Ontology Matching., , , , and . IWANN (1), volume 7902 of Lecture Notes in Computer Science, page 435-444. Springer, (2013)Real-Time Network Auditing System Based on Low-Cost IoT Devices., , , , and . UCAmI, volume 594 of Lecture Notes in Networks and Systems, page 1061-1072. Springer, (2022)Early Intrusion Detection for OS Scan Attacks., , , , and . NCA, page 1-5. IEEE, (2019)Low-cost, scalable IoT technology for real-time streaming network auditing., , , and . XoveTIC, volume 14 of Kalpa Publications in Computing, page 100-103. EasyChair, (2022)Site Agnostic Approach to Early Detection of Cyberbullying on Social Media Networks., , , and . Sensors, 23 (10): 4788 (2023)Tools for managing network traffic flows: A comparative analysis., , , , and . NCA, page 329-333. IEEE Computer Society, (2017)Measuring Early Detection of Anomalies., , , and . IEEE Access, (2022)