Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A refreshing perspective of search engine caching., , , , , , and . WWW, page 181-190. ACM, (2010)Towards a Certification-Centred Software Engineering Programme., , and . CSEE&T, page 22-31. IEEE Computer Society, (2002)Causes and remedy of stability and convergence problems in back-propagation learning., , , and . Neural Parallel & Scientific Comp., 3 (3): 357-368 (1995)Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees., , and . Pattern Recognit. Lett., 29 (7): 918-924 (2008)The TickerTAIP Parallel RAID Architecture., , , and . ACM Trans. Comput. Syst., 12 (3): 236-269 (1994)Hospital and emergency ambulance link: using IT to enhance emergency pre-hospital care., and . Int. J. Medical Informatics, 61 (2-3): 147-161 (2001)Neural Generation Meets Real People: Building a Social, Informative Open-Domain Dialogue Agent., , , , , , , , , and 11 other author(s). SIGDIAL, page 376-395. Association for Computational Linguistics, (2022)The TickerTAIP Parallel RAID Architecture., , , and . ISCA, page 52-63. ACM, (1993)DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN., , , , , and . ICDM, page 1122-1127. IEEE Computer Society, (2018)An Investigation of Electronic Data Interchange Risks, Security and Controls., and . ECIS, page 899-916. (1996)