Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Sequence Associations for Rare Events., , , and . PAKDD, volume 3056 of Lecture Notes in Computer Science, page 235-239. Springer, (2004)A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data., , and . PAKDD, volume 5476 of Lecture Notes in Computer Science, page 813-822. Springer, (2009)Processing Constrained k-Closest Pairs Queries in Crime Databases., , , , , , and . Security Informatics, volume 9 of Annals of Information Systems, Springer, (2010)Discovering Prediction Model for Environmental Distribution Maps., , , , , , and . PAKDD Workshops, volume 4819 of Lecture Notes in Computer Science, page 99-109. Springer, (2007)A Delivery Framework for Health Data Mining and Analytics., , , and . ACSC, volume 38 of CRPIT, page 381-390. Australian Computer Society, (2005)An Effective Pattern Based Outlier Detection Approach for Mixed Attribute Data., and . Australasian Conference on Artificial Intelligence, volume 6464 of Lecture Notes in Computer Science, page 122-131. Springer, (2010)KISTCM: knowledge discovery system for traditional Chinese medicine., , , , , and . Appl. Intell., 32 (3): 346-363 (2010)An expanding self-organizing neural network for the traveling salesman problem., , and . Neurocomputing, (2004)Detecting Network Anomalies in Mixed-Attribute Data Sets., and . WKDD, page 383-386. IEEE Computer Society, (2010)Constrained k-closest pairs query processing based on growing window in crime databases., , , , and . ISI, page 58-63. IEEE, (2008)