Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralised privacy preservation in social networks., , , and . IJBIS, 9 (4): 402-414 (2012)Performance evaluation of different replica placement algorithms., , and . IJGUC, 1 (2): 121-133 (2009)Report on the Fourth International Conference on Knowledge Capture (K-CAP 2007)., , and . AI Magazine, 30 (1): 126-127 (2009)Genetic algorithms based approach to database vertical partition., , and . J. Intell. Inf. Syst., 26 (2): 167-183 (2006)Web outlier mining: Discovering outliers from web datasets., , and . Intell. Data Anal., 9 (5): 473-486 (2005)A Boosting Genetic Fuzzy Classifier for Intrusion Detection Using Data Mining Techniques for Rule Pre-screening., , and . HIS, volume 105 of Frontiers in Artificial Intelligence and Applications, page 983-992. IOS Press, (2003)Reliable Transaction Execution in Multidatabase Systems., and . RIDE-IMS, page 344-347. IEEE Computer Society, (1991)A computer systems simulator., and . Winter Simulation Conference, page 329-333. ACM, (1982)Semantic Interoperability Between Relational Database Systems., , and . IDEAS, page 208-215. IEEE Computer Society, (2007)Learning by Reading: A Prototype System, Performance Baseline and Lessons Learned., , , , , , , , , and 5 other author(s). AAAI, page 280-286. AAAI Press, (2007)