Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent systems for detecting and filtering spam e-mail: a survey., , , and . Inteligencia Artif., 11 (34): 63-81 (2007)Editorial: Blockchain based sustainable, secure healthcare systems., , , , and . Comput. Networks, (2022)Applying lazy learning algorithms to tackle concept drift in spam filtering., , , , and . Expert Syst. Appl., 33 (1): 36-48 (2007)idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining., , , , , and . Inf. Sci., (2013)Strategic Particle Swarm Inertia Selection for Electricity Markets Participation Portfolio Optimization., , , and . Appl. Artif. Intell., 32 (7-8): 745-767 (2018)Integration of Wearable Solutions in AAL Environments with Mobility Support., , , , and . J. Medical Systems, 39 (12): 184 (2015)Applying Wearable Solutions in Dependent Environments., , , and . IEEE Trans. Information Technology in Biomedicine, 14 (6): 1459-1467 (2010)CAFCLA: An AmI-Based Framework to Design and Develop Context-Aware Collaborative Learning Activities., , , and . ISAmI, volume 219 of Advances in Intelligent Systems and Computing, page 41-48. Springer, (2013)An execution time planner for the ARTIS agent architecture., , , , , , and . Eng. Appl. Artif. Intell., 21 (5): 769-784 (2008)Applying CBR Systems to Micro Array Data Classification., , , and . IWPACBB, volume 49 of Advances in Soft Computing, page 102-111. Springer, (2008)