Author of the publication

An Application of Text Mining: Bibliographic Navigator Powered by Extended Association Rules.

, and . HICSS, IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Association Algorithm Based on ROC Convex Hull Method in Bibliographic Navigation System., and . Discovery Science, volume 1721 of Lecture Notes in Computer Science, page 333-334. Springer, (1999)Investigation of Coding Violations Focusing on Authorships of Source Files., , and . ACIT/CSII/BCD, page 248-253. IEEE, (2017)Examination of Coding Violations Focusing on Their Change Patterns over Releases., , and . APSEC, page 121-128. IEEE Computer Society, (2016)A Test Case Recommendation Method Based on Morphological Analysis, Clustering and the Mahalanobis-Taguchi Method., , , and . ICST Workshops, page 29-35. IEEE Computer Society, (2017)Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and Importance., , and . COMPSAC (1), page 837-838. IEEE Computer Society, (2018)Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-Grained Repository-Based Co-Evolution Analysis., , , , and . SEAA, page 120-124. IEEE, (2022)Significance of Emphasized Features for Good Representation on Deep Metric Learning., , and . SERA, page 27-32. IEEE, (2021)A Comparative Study of Hybrid Fault-Prone Module Prediction Models Using Association Rule and Random Forest., , , , and . WSSE, page 33-38. ACM, (2023)Replica caching scheme according to status of neighboring nodes in optical grid networks., and . NOF, page 112-116. IEEE, (2011)Fault-Prone Source File Analysis Focusing on the Contribution Entropy in Open Source Development., , , , and . BCD, page 7-14. IEEE Computer Society, (2018)