Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-objective feature selection by using NSGA-II for customer churn prediction in telecommunications., , and . Expert Syst. Appl., 37 (5): 3638-3646 (2010)An effective hybrid learning system for telecommunication churn prediction., and . Expert Syst. Appl., 40 (14): 5635-5647 (2013)Investigating Cybercrimes that Occur on Documented P2P Networks., , and . IJACI, 3 (2): 56-63 (2011)Project Portfolio: A Job Scheduling Approach., , and . CISIS, page 847-852. IEEE Computer Society, (2012)Performance study of distributed Apriori-like frequent itemsets mining., , and . Knowl. Inf. Syst., 23 (1): 55-72 (2010)An Open Framework for Smartphone Evidence Acquisition., , , and . IFIP Int. Conf. Digital Forensics, volume 383 of IFIP Advances in Information and Communication Technology, page 159-166. Springer, (2012)Mining Spatio-Temporal Data at Different Levels of Detail., , and . AGILE Conf., page 225-240. Springer, (2008)A Hybrid HMM-SVM Method for Online Handwriting Symbol Recognition., , , and . ISDA (1), page 887-891. IEEE Computer Society, (2006)A comparative study of peer to peer dynamic load balancing on embedded topologies., and . Parallel and Distributed Computing and Networks, page 180-185. IASTED/ACTA Press, (2007)The Data Wave: Data Management and Mining.. WETICE, page 7-11. IEEE Computer Society, (2010)