Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on the Design of Large-Scale Mobile Recording and Tracking Systems., and . HICSS (7), page 701-711. IEEE Computer Society, (1998)Parallel processing of graph reachability in databases., , , , and . International Journal of Parallel Programming, 21 (4): 269-302 (1992)Multiwavelength Analysis for a First-order Consecutive Reaction., and . Computers & Chemistry, 16 (3): 239-242 (1992)Performance Evaluation of Adaptive Media Access Control Protocols for Pervasive Wireless Networks., and . Journal of Interconnection Networks, 3 (3-4): 253-272 (2002)Adaptive Intrusion Detection: A Data Mining Approach., , and . Artif. Intell. Rev., 14 (6): 533-567 (2000)A Data Mining Framework for Building Intrusion Detection Models., , and . IEEE Symposium on Security and Privacy, page 120-132. IEEE Computer Society, (1999)Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew., , , and . PDIS, page 40-49. IEEE Computer Society, (1994)Mining in a Data-Flow Environment: Experience in Network Intrusion Detection., , and . KDD, page 114-124. ACM, (1999)Mining Audit Data to Build Intrusion Detection Models., , and . KDD, page 66-72. AAAI Press, (1998)A Methodology for Evaluating Parallel Graph Algorithms and Its Application to Single Source Reachability., , , , and . PDIS, page 243-250. IEEE Computer Society, (1993)