Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object-Oriented Modeling of Multimedia Documents., , and . Comput. Networks, 30 (1-7): 578-582 (1998)Ontology-Based Business Process Customization for Composite Web Services., , , , and . IEEE Trans. Syst. Man Cybern. Part A, 41 (4): 717-729 (2011)Recommending New Features from Mobile App Descriptions., , , , , , and . ACM Trans. Softw. Eng. Methodol., 28 (4): 22:1-22:29 (2019)A Chinese time ontology for the Semantic Web., , , and . Knowl. Based Syst., 24 (7): 1057-1074 (2011)Multi-modal multi-view Bayesian semantic embedding for community question answering., , , and . Neurocomputing, (2019)Collaborative social deep learning for celebrity recommendation., , , and . Intell. Data Anal., 22 (6): 1375-1394 (2018)Rule Induction Without Decision Tree Construction., , and . ECAI, page 463-470. John Wiley and Sons, Chichester, (1996)Discretization Methods., , and . The Data Mining and Knowledge Discovery Handbook, Springer, (2005)An Intrusion Detection Model Based on Mining Data Streams., , and . DMIN, page 398-403. CSREA Press, (2008)The HCV Induction Algorithm.. ACM Conference on Computer Science, page 168-175. ACM, (1993)