Author of the publication

Clustering of Web Documents Using Graph Representations.

, , , and . Applied Graph Theory in Computer Vision and Pattern Recognition, volume 52 of Studies in Computational Intelligence, Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving accuracy of classification models induced from anonymized datasets., , , and . Inf. Sci., (2014)DegExt - A Language-Independent Graph-Based Keyphrase Extractor., , , , and . AWIC, volume 86 of Advances in Intelligent and Soft Computing, page 121-130. Springer, (2011)Classification of Web Documents Using Concept Extraction from Ontologies., , and . AIS-ADM, volume 4476 of Lecture Notes in Computer Science, page 287-292. Springer, (2007)Information-efficient design of an automatic aircraft maintenance supervisor., and . Comput. Oper. Res., 20 (4): 421-434 (1993)A fuzzy-based lifetime extension of genetic algorithms., and . Fuzzy Sets Syst., 149 (1): 131-147 (2005)Modeling software testing costs and risks using fuzzy logic paradigm., and . J. Syst. Softw., 80 (6): 817-835 (2007)Using discretization for extending the set of predictive features., , , and . EURASIP J. Adv. Signal Process., (2018)CryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic Encryption., and . CSCML, volume 12161 of Lecture Notes in Computer Science, page 245-253. Springer, (2020)Optimizing a batch manufacturing process through interpretable data mining models., , , and . J. Intell. Manuf., 20 (5): 523-534 (2009)Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS)., , , , , , and . J. Assoc. Inf. Sci. Technol., 61 (2): 405-418 (2010)