Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms to Watermark Software Through Register Allocation., and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 180-191. Springer, (2005)Informed Recognition in Software Watermarking.. PAISI, volume 4430 of Lecture Notes in Computer Science, page 257-261. Springer, (2007)Test Cost Constraint Reduction with Common Cost., , and . FGIT, volume 7105 of Lecture Notes in Computer Science, page 55-63. Springer, (2011)A Competition Strategy to Cost-Sensitive Decision Trees., and . RSKT, volume 7414 of Lecture Notes in Computer Science, page 359-368. Springer, (2012)A New Type of Covering-Based Rough Sets., and . RSKT, volume 8818 of Lecture Notes in Computer Science, page 489-499. Springer, (2014)Basic Concepts in Covering-Based Rough Sets.. ICNC (5), page 283-286. IEEE Computer Society, (2007)A matroidal structure for formal context and its applications on epidemiological study., and . ICMLC, page 93-98. IEEE, (2015)A Comparison of Two Types of Covering-Based Rough Sets Through the Complement of Coverings., and . RSFDGrC, volume 9437 of Lecture Notes in Computer Science, page 90-101. Springer, (2015)Rough Sets in Partially Ordered Sets., , and . GrC, page 696-699. IEEE Computer Society, (2010)Relationships among three types of covering rough sets., and . GrC, page 43-48. IEEE, (2006)