Author of the publication

An Effective Approach to Outlier Detection Based on Centrality and Centre-Proximity.

, , , , , , and . Informatica, 31 (3): 435-458 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication., , , , , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 370-381. Springer, (2005)Efficient recommendation methods using category experts for a large dataset., , , , and . Inf. Fusion, (2016)The Chamois Reconfigurable Data-Mining Architecture., , , , , , , , , and 5 other author(s). J. Object Technol., 1 (2): 21-33 (2002)Intelligent power management device with middleware based living pattern learning for power reduction., , , , and . IEEE Trans. Consumer Electronics, 55 (4): 2081-2089 (2009)Distributed processing of event data and multi-faceted knowledge in a collaboration federation., , , , , , and . ISI, page 64-69. IEEE, (2008)Software Architecture Module-View Recovery Using Cluster Ensembles., , , and . IEEE Access, (2019)On using category experts for improving the performance and accuracy in recommender systems., , , and . CIKM, page 2355-2358. ACM, (2012)A Knowledge Network Approach for Implementing Active Virtual Marketplaces., , and . J. Data Semant., (2005)Speeding up Warehouse Physical Design Using a Randomized Algorithm., and . DMDW, volume 19 of CEUR Workshop Proceedings, page 3. CEUR-WS.org, (1999)Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants., , and . Secur. Commun. Networks, (2022)