From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Estimating the Importance of Terrorists in a Terror Network., , , , , , , , , и . Mining Social Networks and Security Informatics, Springer, (2013)Fast Frequent Pattern Detection Using Prime Numbers., , , и . IDEAL, том 8669 из Lecture Notes in Computer Science, стр. 93-101. Springer, (2014)Serious Cross Reality - Using CR to Enhance Analytics Workflow., , , , , и . ISMAR-Adjunct, стр. 44-49. IEEE, (2023)Graph-based approach for outlier detection in sequential data and its application on stock market and weather data., , , , , , , и . Knowl. Based Syst., (2014)Robust integrated framework for effective feature selection and sample classification and its application to gene expression data analysis., , , , , , , , , и 3 other автор(ы). CIBCB, стр. 112-119. IEEE, (2012)Diversity and Influence as Key Measures to Assess Candidates for Hiring or Promotion in Academia., , , и . Social Network Based Big Data Analysis and Applications, Springer, (2018)Effective web log mining and online navigational pattern prediction., , , , , , и . Knowl. Based Syst., (2013)Towards an Ambient Smart City: Using Augmented Reality to Geospatially Filter the Right Airbnb via Artificial Intelligence., и . HCI (36), том 12797 из Lecture Notes in Computer Science, стр. 472-489. Springer, (2021)A systematic literature review of the Design Critique method., , , , и . Inf. Softw. Technol., (2023)Examining social networks between educational institutions, industrial partners, and the Canadian government., , , , , и . IRI, стр. 664-671. IEEE, (2012)