Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conceptual and Systematic Design Approach for XML Document Warehouses., , , and . IJDWM, 1 (3): 63-87 (2005)E-MACSC: A novel dynamic cache tuning technique to reduce information retrieval roundtrip time over the Internet., , and . Computer Communications, 29 (8): 1094-1109 (2006)A fault tolerant model to attain reliability and high performance for distributed computing on the Internet., and . Computer Communications, 23 (18): 1747-1762 (2000)Correction to a Footnote in "Theoretical and Practical Considerations of Uncertainty and Complexity in Automated Knowledge Acquisition"., and . IEEE Trans. Knowl. Data Eng., 8 (2): 351 (1996)An Algebraic Theory of Object-Oriented Systems., and . IEEE Trans. Knowl. Data Eng., 6 (3): 412-419 (1994)Decentralized multi-objective bilevel decision making with fuzzy demands., , and . Knowl.-Based Syst., 20 (5): 495-507 (2007)Mining of patient data: towards better treatment strategies for depression., , and . I. J. Functional Informatics and Personalised Medicine, 3 (2): 122-143 (2010)Supporting metasearch with XSL., , and . Journal of Systems and Software, (2004)Operation properties and delta-equalities of complex fuzzy sets., , , , and . Int. J. Approx. Reasoning, 50 (8): 1227-1249 (2009)Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks., , and . Computer Networks and ISDN Systems, 27 (10): 1447-1456 (1995)