From post

Formal Concept Analysis Based Clustering for Blog Network Visualization.

, и . ADMA (1), том 6440 из Lecture Notes in Computer Science, стр. 394-404. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Useful Visualization Technique: A Literature Review for Augmented Reality and its Application, limitation & future direction., , , , и . VINCI, стр. 311-337. Springer, (2009)Time-Varying Cumulative Damage Recursive Method for Power Semiconductor Devices., , , , , , , и . IEEE Trans. Ind. Electron., 70 (12): 12795-12805 (2023)Discrete-time contraction-based control of nonlinear systems with parametric uncertainties using neural networks., , и . Comput. Chem. Eng., (2022)An Effective Multi-Chord Corner Detection Technique., , и . DICTA, стр. 1-8. IEEE, (2016)Experience With a Linguistic Variant Affects the Acquisition of Its Sociolinguistic Meaning: An Alien-Language-Learning Experiment., , и . Cogn. Sci., (2020)Content to Node: Self-Translation Network Embedding., , , , и . IEEE Trans. Knowl. Data Eng., 33 (2): 431-443 (2021)User Interest Based Complex Web Information Visualization., и . APWeb, том 7808 из Lecture Notes in Computer Science, стр. 429-436. Springer, (2013)Detecting Social Spammers in Sina Weibo Using Extreme Deep Factorization Machine., , , , , и . WISE (1), том 12342 из Lecture Notes in Computer Science, стр. 170-182. Springer, (2020)X-DOG: An Intelligent X-ray-based Dangerous Goods Detection and Automatic Alarm System., , , , и . iThings/GreenCom/CPSCom/SmartData/Cybermatics, стр. 576-582. IEEE, (2020)Microsoft Research Asia TRECVID 2006 High-Level Feature Extraction and Rushes Exploitation., , , , , , , и . TRECVID, National Institute of Standards and Technology (NIST), (2006)