Author of the publication

Dublin Core-Based Metadata Extracting Algorithm from RDF-Based Information Elements.

, , and . WKDD, page 114-117. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Verification of Belief Programs., and . CoRR, (2022)Research on Ordinal Properties in Combinatorics Coding Method., , and . J. Comput., 6 (1): 51-58 (2011)Projection in a probabilistic epistemic logic and its application to belief-based program verification.. RWTH Aachen University, Germany, (2023)A Bio-inspired Multidimensional Network Security Model., , , and . IMSCCS (2), page 3-7. IEEE Computer Society, (2006)0-7695-2581-4.A New Automatic Intrusion Response Taxonomy and Its Application., , , , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 999-1003. Springer, (2006)Design and Implementation of a Workflow-Based Message-Oriented Middleware., , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 842-845. Springer, (2006)Trajectory planning of large redundant manipulator considering kinematic constraints and energy efficiency., , , , , and . Robotica, 41 (11): 3524-3540 (November 2023)ART Based Predictive Caching System for XML P2P Database., and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 3-10. Springer, (2004)Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems., , and . ICCSA (3), volume 3045 of Lecture Notes in Computer Science, page 706-714. Springer, (2004)Clustering method via independent components for semi-structured documents., , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6241 of SPIE Proceedings, page 62410V. SPIE, (2006)