Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SensorWebIDS: a web mining intrusion detection system., , and . IJWIS, 4 (1): 97-120 (2008)A taxonomy of sequential pattern mining algorithms., and . ACM Comput. Surv., 43 (1): 3:1-3:41 (2010)Mining Sequential Patterns of Historical Purchases for E-commerce Recommendation., , and . DaWaK, volume 11708 of Lecture Notes in Computer Science, page 57-72. Springer, (2019)TidFP: Mining Frequent Patterns in Different Databases with Transaction ID., and . DaWaK, volume 5691 of Lecture Notes in Computer Science, page 125-137. Springer, (2009)Ontology-based Web Recommendation from tags., and . ICDE Workshops, page 206-211. IEEE Computer Society, (2011)Semantic-Rich Markov Models for Web Prefetching., and . ICDM Workshops, page 465-470. IEEE Computer Society, (2009)School Age Children's Cognition Identification by Mining Integrated Computer Games Data., , , , , and . CSEDU (2), page 495-505. SciTePress, (2012)Comparative Mining of B2C Web Sites by Discovering Web Database Schemas., and . IDEAS, page 183-192. ACM, (2016)WiFi Miner: An Online Apriori-Infrequent Based Wireless Intrusion System., , and . KDD Workshop on Knowledge Discovery from Sensor Data, volume 5840 of Lecture Notes in Computer Science, page 76-93. Springer, (2008)Mining very long sequences in large databases with PLWAPLong., , and . IDEAS, page 234-241. ACM, (2009)