Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limn Matrix: A Tool for Visualizing Large, Distributed, High-Dimension Data Sets., , and . CAINE, page 263-268. ISCA, (2005)An Accuracy Model for Relational Databases., , and . Computers and Their Applications, page 225-230. ISCA, (2007)Lightweight agents for intrusion detection., , , , and . Journal of Systems and Software, 67 (2): 109-122 (2003)Enriching STEM education through personalization and teaching collaboration., , , and . PerCom Workshops, page 543-549. IEEE Computer Society, (2011)A Polynomial Time Algorithm for Testing Implications of a Join Dependency and Embodied Functional Dependencies., , and . SIGMOD Conference, page 218-224. ACM Press, (1988)SIGMOD Record 17(3), September 1988.Guest Editor's Notes., and . I. J. Comput. Appl., 21 (3): 141 (2014)Managing Knowledge in Organizational Memory Using Topics Maps1., , , , and . IJKM, 4 (1): 17-28 (2008)Comparing Strategies for Evaluating Older Adults to Improve Web Accessibility., , and . CATA, page 13-18. ISCA, (2009)Automated discovery of concise predictive rules for intrusion detection., , , and . Journal of Systems and Software, 60 (3): 165-175 (2002)Towards the automatic generation of mobile agents for distributed intrusion detection system., , , , , , , and . Journal of Systems and Software, 79 (1): 1-14 (2006)