Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RBAC-based access control for privacy preserving in semantic web., , , , , and . ICUIMC, page 63. ACM, (2010)Mining association rules in tree structured XML data., , , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 807-811. ACM, (2009)Mining Reputation of Person/Product from Comment and Reply on UCC/Internet Article., , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 354-361. Springer, (2010)A method for opinion mining of product reviews using association rules., , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 270-274. ACM, (2009)Mining opinions from messenger., , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 287-290. ACM, (2009)FIA: Frequent Itemsets Mining Based on Approximate Counting in Data Streams., , and . ICONIP (1), volume 5863 of Lecture Notes in Computer Science, page 312-322. Springer, (2009)