Author of the publication

A Non-Euclidean Model for Web Retrieval.

, , and . Web-Age Information Management, volume 1846 of Lecture Notes in Computer Science, page 233-238. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of fuzzy control method in a tunnel lighting system., , , and . Mathematical and Computer Modelling, 54 (3-4): 931-937 (2011)Improved group key transfer protocols from the protocol of Harn et al.. Security and Communication Networks, 6 (12): 1471-1477 (2013)Ship detection for Radarsat-2 ScanSAR data using DoG scale-space., , , , , and . IGARSS, page 1881-1884. IEEE, (2013)Short-term Load Forecasting at Different Aggregation Levels with Predictability Analysis., , , , , , and . CoRR, (2019)Linked Recurrent Neural Networks., , , and . CoRR, (2018)A Rprop-Neural-Network-Based PV Maximum Power Point Tracking Algorithm with Short-Circuit Current Limitation., , , , and . CoRR, (2018)Multi-Sensor Registration in High-Precision CMM Based on a Composite Standard., , , , , , and . Sensors, 18 (4): 1220 (2018)Fuzzy games with communication networks., , , and . GAMENETS, page 1-4. IEEE, (2014)Vague color image enhancement on fractional differential and improved retinex., , , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 9395 of SPIE Proceedings, page 93950Q. SPIE, (2015)Leakage resilient CCA secure IBE with all-but-one lossy filter.. IJAHUC, 21 (4): 266-272 (2016)