Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis., and . ICDF2C, volume 114 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-21. Springer, (2012)Admire framework: Distributed data mining on data grid platforms., , and . ICSOFT (2), page 67-72. INSTICC Press, (2006)A New Efficient Clustering Algorithm for Network Alarm Analysis., , and . IASTED PDCS, page 638-643. IASTED/ACTA Press, (2005)The Extreme Right Filter Bubble., , , , and . CoRR, (2013)Combining Semantic and Syntactic Document Classifiers to Improve First Story Detection., and . SIGIR, page 424-425. ACM, (2001)Medical Disorder Recognition with Structural Support Vector Machines., , and . CLEF (Working Notes), volume 1179 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)News Headline Generation based on Linguistic Methods., , , , , and . Artificial Intelligence and Applications, page 551-555. IASTED/ACTA Press, (2005)Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results., , , and . Digital Investigation, 10 (1): 34-43 (2013)Identifying semantic equivalence for multi-document summarisation., , , and . Artif. Intell. Rev., 25 (1-2): 55-65 (2006)Machine Learning Approach to Augmenting News Headline Generation., , and . IJCNLP (companion), Asian Federation of Natural Language Processing, (2005)