Author of the publication

BookmarkFeeder: A Web Agent with Implicit Feedback and URL-Based Recommendation.

, , , , , and . IMSA, page 305-309. IASTED/ACTA Press, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noise insensitive demosaicing algorithm., , , , , and . SIP, page 422-427. IASTED/ACTA Press, (2007)Machine learning-based software classification scheme for efficient program similarity analysis., , , , , and . RACS, page 114-118. ACM, (2015)Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation., , , , , and . RACS, page 148-152. ACM, (2016)A Static Birthmark of Windows Binary Executables Based on Strings., , , , , , and . IMIS, page 734-738. IEEE Computer Society, (2013)Measuring similarity of android applications via reversing and K-gram birthmarking., , , , , , , and . RACS, page 336-341. ACM, (2013)An anti-piracy mechanism based on class separation and dynamic loading for Android applications., , , , , and . RACS, page 328-332. ACM, (2012)Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems., and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 755-764. Springer, (2006)Energy Consumption Optimization of Real-Time Embedded Systems., , , , , , and . ICESS, page 281-287. IEEE Computer Society, (2009)A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications., , , , , , , and . IMIS, page 723-728. IEEE Computer Society, (2013)Efficient Identification of Windows Executable Programs to Prevent Software Piracy., , , , and . IMIS, page 236-240. IEEE Computer Society, (2014)