Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving accuracy of classification models induced from anonymized datasets., , , and . Inf. Sci., (2014)The Theory and Applications of Generalized Complex Fuzzy Propositional Logic., , and . Soft Computing: State of the Art Theory and Novel Applications, volume 291 of Studies in Fuzziness and Soft Computing, Springer, (2013)A Scalable Algorithm for One-to-One, Onto, and Partial Schema Matching with Uninterpreted Column Names and Column Values., and . J. Database Manag., 25 (4): 1-16 (2014)Using Data Mining Technology for Terrorist Detection on the Web.. Fighting Terror in Cyberspace, volume 65 of Series in Machine Perception and Artificial Intelligence, WorldScientific, (2005)Classification Of Web Documents Using Graph Matching., , , and . IJPRAI, 18 (3): 475-496 (2004)Listen to the Sound of Data., and . Multimedia Data Mining and Analytics, Springer, (2015)Experimental Comparison of Sequence and Collaboration Diagrams in Different Application Domains., , , and . EMMSAD, volume 363 of CEUR Workshop Proceedings, page 77-90. CEUR-WS.org, (2005)Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS)., , , , , , and . J. Assoc. Inf. Sci. Technol., 61 (2): 405-418 (2010)A fuzzy-based lifetime extension of genetic algorithms., and . Fuzzy Sets Syst., 149 (1): 131-147 (2005)Information-efficient design of an automatic aircraft maintenance supervisor., and . Comput. Oper. Res., 20 (4): 421-434 (1993)