Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial Relation Based Object Extraction from the World Wide Web., , and . Web Intelligence/IAT Workshops, page 94-97. IEEE Computer Society, (2008)978-0-7695-3496-1.Contracting of E-business Services in a Constraint-Based Process Modeling Framework., , and . SKG, page 67-74. IEEE Computer Society, (2011)Concolic Execute Fuzzing Based on Control-Flow Analysis., , , and . CIS, page 385-389. IEEE Computer Society, (2015)Hierarchical Clustering of Group Behaviors in Cyber Situation Awareness., , , and . QRS Companion, page 400-401. IEEE, (2016)Extracting Relations from Chinese Web Documents Using Kernel Methods., and . ACIS-ICIS, page 352-356. IEEE Computer Society, (2009)Shell Miner: Mining Organizational Phrases in Argumentative Texts in Social Media., , , , and . ICDM, page 797-802. IEEE Computer Society, (2014)Personalized Mention Probabilistic Ranking - Recommendation on Mention Behavior of Heterogeneous Social Network., , , and . WAIM Workshops, volume 9391 of Lecture Notes in Computer Science, page 41-52. Springer, (2015)Knowledge graph embedding with concepts., , and . Knowl.-Based Syst., (2019)Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings., , and . IACR Cryptology ePrint Archive, (2011)Application of dynamic service composition in web question answering., , and . IJWMC, 5 (3): 300-307 (2012)