Author of the publication

Spam email filtering with bayesian belief network: using relevant words.

, , , , and . GrC, page 238-243. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phone n' Computer: teaming up an information appliance with a PC., , and . Personal and Ubiquitous Computing, 14 (7): 601-607 (2010)Dynamic analysis of structure by using wilson-Theta method., , , and . International Journal of Computational Engineering Science, 5 (2): 445-450 (2004)Data Center Multicast with High Stability., , , , , and . CBD, page 168-173. IEEE Computer Society, (2014)The Influence of Beacon on DV-hop in Wireless Sensor Networks., , , and . GCC Workshops, page 459-462. IEEE Computer Society, (2006)Using Maximum Margin Criterion and Minimax Probability Machine for Document Classification., , , and . WKDD, page 399-402. IEEE Computer Society, (2010)Research of Recharging Scheduling Scheme for Wireless Sensor Networks Based on Cuckoo Search., , , , and . IJCNN, page 1-7. IEEE, (2018)Discovery of Novel Tubulin Inhibitors via Structure-Based Hierarchical Virtual Screening., , , , , and . Journal of Chemical Information and Modeling, 52 (10): 2730-2740 (2012)Key Course Selection for Academic Early Warning Based on Gaussian Processes., , and . IDEAL, volume 9937 of Lecture Notes in Computer Science, page 240-247. Springer, (2016)The benefits of augmenting telephone voice menu navigation with visual browsing and search., and . CHI, page 319-328. ACM, (2006)A novel and practical algorithm for generating 3D volumetric clouds., , , , and . WCSP, page 1-5. IEEE, (2015)