Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Survey of Data Mining-based Fraud Detection Research, , , and . CoRR, (2010)An Intelligent Algorithm for Modeling and Optimizing Dynamic Supply Chains Complexity., , and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 975-980. Springer, (2006)Demand Response Architectures and Load Management Algorithms for Energy-Efficient Power Grids: A Survey., , , , , and . KICSS, page 134-141. IEEE, (2012)The Relationship between Complementary Services and Service System Value Creation: A Case Study of eMarketplaces in Saudi Arabia., , and . KICSS, page 211-215. IEEE, (2012)DAG: A General Model for Privacy-Preserving Data Mining : (Extended Abstract)., , and . ICDE, page 2018-2019. IEEE, (2020)Customer Satisfaction: Moderator of e-Business Performance and e-Business Liveability., , , and . J. Softw., 10 (5): 524-537 (2015)Towards Sustainability of eMarketplaces., , and . PACIS, page 294. (2014)Robotic Hierarchical Graph Neurons. A novel implementation of HGN for swarm robotic behaviour control., , , , and . Expert Syst. Appl., (2021)Multiple Autonomous Robots Coordination and Navigation., , and . J. Robotics, (2019)Dissecting Twitter: A Review on Current Microblogging Research and Lessons from Related Fields., and . From Sociology to Computing in Social Networks, volume 1 of Lecture Notes in Social Networks, Springer, (2010)