Author of the publication

Web Spam Detection via Commercial Intent Analysis.

, , , and . AIRWeb, volume 215 of ACM International Conference Proceeding Series, page 89-92. (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Bayesian approach to optimal performance of page storage hierarchies., , and . Acta Cybern., 3 (2): 79-89 (1977)A note on data base integrity., and . Acta Cybern., 3 (3): 181-185 (1977)A Document Centric Approach for Analysis and Design of E-government Systems., and . EGOVIS, volume 9265 of Lecture Notes in Computer Science, page 319-333. Springer, (2015)Functional Dependencies on Extended Relations Defined by Regular Languages., and . FoIKS, volume 7153 of Lecture Notes in Computer Science, page 384-403. Springer, (2012)Flexible and Efficient Distributed Resolution of Large Entities., , and . FoIKS, volume 7153 of Lecture Notes in Computer Science, page 244-263. Springer, (2012)Dilworth's Theorem and Its Application for Path Systems of a Cycle - Implementation and Analysis., , and . ESA, volume 1643 of Lecture Notes in Computer Science, page 498-509. Springer, (1999)Using the BonFIRE Testbed for Testing Scalability of the KOPI Service., , , and . ERCIM News, (2013)Towards Streamlined Big Data Analytics., , , , , , , , and . ERCIM News, (2016)Covering symmetric supermodular functions by graphs., and . Math. Program., 84 (3): 483-503 (1999)Fully distributed robust singular value decomposition., , , and . P2P, page 1-9. IEEE, (2014)