From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems., , , , , и . AST/UCMA/ISA/ACN, том 6059 из Lecture Notes in Computer Science, стр. 115-128. Springer, (2010)SNMK: simple network management knowledge., и . NOMS, стр. 381-390. IEEE, (1998)Semi-Supervised Community Detection via Constraint Matrix Construction and Active Node Selection., , , , , и . IEEE Access, (2020)Query-driven Frequent Co-occurring Term Extraction over Relational Data using MapReduce, , , , и . CoRR, (2013)AES Based on Key Dependently Nonlinear Redundant S-Box., и . ICC, стр. 1-6. IEEE, (2019)Distributed Pregel-based provenance-aware regular path query processing on RDF knowledge graphs., , , , , и . World Wide Web, 23 (3): 1465-1496 (2020)Special Issue of DASFAA 2018., и . Data Sci. Eng., 3 (4): 291-292 (2018)Parallel algorithms for anomalous subgraph detection., , , , , и . Concurr. Comput. Pract. Exp., (2017)A Bisubmodular Approach to Event Detection and Prediction in Multivariate Social Graphs., , , и . IEEE Trans. Comput. Soc. Syst., 8 (1): 161-170 (2021)Deep Learning Schema-based Event Extraction: Literature Review and Current Trends., , , , , , , , и . CoRR, (2021)