Author of the publication

Relational Restricted Boltzmann Machines: A Probabilistic Logic Learning Approach.

, , , , , and . ILP, volume 10759 of Lecture Notes in Computer Science, page 94-111. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems., , and . ICEIS (1), page 267-272. (2005)A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics., , , , , , and . IEEE Access, (2020)Evolutionary Computing Techniques for Software Effort Estimation, , and . (2017)NeuSTIP: A Novel Neuro-Symbolic Model for Link and Time Prediction in Temporal Knowledge Graphs., , , and . CoRR, (2023)SEEDRP: a Secure Energy Efficient Dynamic Routing Protocol in Fanets., and . Wirel. Pers. Commun., 120 (2): 1251-1277 (2021)Soft computing techniques for software effort estimation., , and . CoRR, (2013)A Comparative Analysis of Various Deployment Based DDoS Defense Schemes., , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 606-616. Springer, (2013)Segmentation of Punjabi Text into Prosodic Unit., and . ICCSE, page 775-779. IEEE, (2019)Radiological Report Generation from Chest X-ray Images Using Pre-trained Word Embeddings., and . Wirel. Pers. Commun., 133 (4): 2525-2540 (December 2023)Towards a comprehensive Questionnaire Origin and Development Appraisal tool: A literature review and a modified nominal group., , , , , , , and . Educ. Inf., 35 (1): 7-20 (2019)