Author of the publication

Mining opinions from messenger.

, , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 287-290. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , and . Sensors, 14 (7): 12937-12957 (2014)A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents., and . WISE Workshops, volume 4256 of Lecture Notes in Computer Science, page 94-103. Springer, (2006)Implementation of OSD Security Framework and Credential Cache., , , and . GPC, volume 4459 of Lecture Notes in Computer Science, page 666-671. Springer, (2007)Mining Information of Anonymous User on a Social Network Service., , , , , and . ASONAM, page 450-453. IEEE Computer Society, (2011)Predictive Model for Protein Function Using Modular Neural Approach., , , , and . ICAPR (1), volume 3686 of Lecture Notes in Computer Science, page 400-409. Springer, (2005)A Semantic Context-Aware Access Control in Pervasive Environments., , , , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 165-174. Springer, (2006)A development of power consumption measurement system for Android smartphones., , , , and . IMCOM, page 95. ACM, (2017)Distributed File Discovery Protocol in Mobile Peer-to-Peer Networks., , and . NCM (1), page 335-340. IEEE Computer Society, (2008)A Data Sanitization Method for Privacy Preserving Data Re-publication., , , , and . NCM (2), page 28-31. IEEE Computer Society, (2008)978-0-7695-3322-3.An Efficient Top-K Query Processing Method for Location Based Services., , and . ICAIP, page 201-204. ACM, (2017)