Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Asymmetric Quorum-based Power Saving Protocol for Clustered Ad Hoc Networks., , and . ICDCS, page 18. IEEE Computer Society, (2007)On Data Labeling for Clustering Categorical Data., , and . IEEE Trans. Knowl. Data Eng., 20 (11): 1458-1472 (2008)Adaptive Information Dissemination: An Extended Wireless Data Broadcasting Scheme with Loan-Based Feedback Control., and . IEEE Trans. Mob. Comput., 2 (4): 322-336 (2003)Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme., , and . IEEE Trans. Knowl. Data Eng., 23 (5): 669-682 (2011)Data mining for path traversal patterns in a web environment, , and . International Conference on Distributed Computing Systems, page 385--392. IEEE, (1996)A Learning-based Framework to Handle Multi-round Multi-party Influence Maximization on Social Networks., , and . KDD, page 695-704. ACM, (2015)Asymmetric support vector machines: low false-positive learning under the user tolerance., , , and . KDD, page 749-757. ACM, (2008)A new cache replacement algorithm for the integration of web caching and prefectching., and . CIKM, page 632-634. ACM, (2002)Binary Interpolation Search for Solution Mapping on Broadcast and On-demand Channels in a Mobile Computing Environment., , and . CIKM, page 434-441. ACM, (2001)Mining Association Rules with Adjustable Accuracy., , and . CIKM, page 151-160. ACM, (1997)