Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient WordNet-Based Summarization for Large Text Documents, and . UNSW-CSE-TR-0311. School of Computer Science and Engineering, University of New South Wales, (2003)Twitter user geolocation by filtering of highly mentioned users., , , and . J. Assoc. Inf. Sci. Technol., 69 (7): 879-889 (2018)GPU-enabled back-propagation artificial neural network for digit recognition in parallel., , , , , , and . J. Supercomput., 72 (10): 3868-3886 (2016)Dynamic Group Optimization Algorithm With Embedded Chaos., , , and . IEEE Access, (2018)Pipeline provenance for cloud-based big data analytics., , , , and . Softw. Pract. Exp., 50 (5): 658-674 (2020)Horn rule discovery with batched caching and rule identifier for proficient compressor of knowledge data., , , and . Softw. Pract. Exp., 53 (3): 682-703 (March 2023)The design of a cloud-based tracker platform based on system-of-systems service architecture., , , , and . Inf. Syst. Frontiers, 19 (6): 1283-1299 (2017)Finding similar pages in a social tagging repository., and . WWW, page 1091-1092. ACM, (2008)Short-Term Memory Variational Autoencoder for Collaborative Filtering., , and . PRICAI (2), volume 11671 of Lecture Notes in Computer Science, page 595-607. Springer, (2019)Insider Threat Detection with Long Short-Term Memory., and . ACSW, page 1:1-1:10. ACM, (2019)