Author of the publication

Knowledge Extraction Using Web Usage Mining.

, , , , and . EAI Endorsed Trans. Scalable Information Systems, 5 (16): e14 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Interface Design for a Mobile Multimedia Application: An Iterative Approach., , , , , , , and . ACHI, page 189-194. IEEE Computer Society, (2008)Learning from Experience: The Analysis of an Extreme Programming Process.. ITNG, page 1405-1410. IEEE Computer Society, (2009)Native Process Migration in Wireless Sensor Networks., , , , and . IJDSN, (2015)Knowledge Extraction Using Web Usage Mining., , , , and . EAI Endorsed Trans. Scalable Information Systems, 5 (16): e14 (2018)Estimation of software features based birthmark., , , and . Cluster Computing, 21 (1): 333-346 (2018)Software Clustering Using Automated Feature Subset Selection., , , , and . ADMA (2), volume 8347 of Lecture Notes in Computer Science, page 47-58. Springer, (2013)Concept and Design of a Contextual Mobile Multimedia Content Usability Study., , , , , , and . ACHI, page 277-282. IEEE, (2009)Cyclomatic complexity: The nesting problem., , and . ICDIM, page 274-279. IEEE, (2013)Fuzzy logic based decision support system for component security evaluation., , , and . Int. Arab J. Inf. Technol., 15 (2): 224-231 (2018)Inside View of an Extreme Process., , , and . XP, volume 9 of Lecture Notes in Business Information Processing, page 226-227. Springer, (2008)