Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal model for knowledge-based systems verification., , , and . Int. J. Intell. Syst., 9 (9): 769-786 (1994)Kernel K-Means for Categorical Data.. IDA, volume 3646 of Lecture Notes in Computer Science, page 46-56. Springer, (2005)ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection., , , and . SIGMOD Record, 30 (4): 15-24 (2001)Towards an Ontology to Support Decision-making in Hospital Bed Allocation (S)., , , , and . SEKE, page 71-74. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)An Architecture for Anomaly Detection., , , and . Applications of Data Mining in Computer Security, Springer, (2002)Bootstrapping a Data Mining Intrusion Detection System., , , , and . SAC, page 421-425. ACM, (2003)GADIS: A Genetic Algorithm for Database Index Selection (S)., , , , and . SEKE, page 39-54. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)COOLCAT: an entropy-based algorithm for categorical clustering., , and . CIKM, page 582-589. ACM, (2002)A Formal Study of Consistency of KBSs., , and . EUROVAV, page 31-38. Logica Ltd., Cambridge, UK, (1991)A Mapping Study about Data Lakes: An Improved Definition and Possible Architectures., , , , and . SEKE, page 453-578. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)