Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach to applying creative computing in tourism by constructing a Big Data based Knowledge System Framework., , , and . ICAC, page 244-249. IEEE, (2016)Utilising Creative Computing and data mining techniques to analyse queries in a meta-search system., , and . ICAC, page 402-407. IEEE, (2016)A Hybrid Business Outlier Detection Algorithm Basing on Creative Computing Methods., , , and . HPCC/SmartCity/DSS, page 836-841. IEEE, (2018)A Content-Based Phishing Email Detection Method., , , , , and . QRS Companion, page 415-422. IEEE, (2017)The creative turn: new challenges for computing., and . Int. J. Creative Comput., 1 (1): 4-19 (2013)Local Nonnegative Matrix Factorization for Mining Typical User Session Profile., , , and . ICWE, volume 3140 of Lecture Notes in Computer Science, page 558-562. Springer, (2004)Authentication and access control in RFID based logistics-customs clearance service platform., , , and . Int. J. Autom. Comput., 7 (2): 180-189 (2010)Energy Cost Minimization with Risk Rate Constraint for Internet Data Center in Deregulated Electricity Markets., , , , , and . IoTBD, page 407-418. SciTePress, (2016)Business rule based program transformation for CRM system evolution., , and . IRI, page 244-247. IEEE Systems, Man, and Cybernetics Society, (2006)Report on the conference on software maintenance 1991, Sorrento, Italy, 14-17 october 1991., , and . Journal of Software Maintenance, 4 (3): 163-175 (1992)