Author of the publication

Theory and Applications of Attribute Decomposition.

, and . ICDM, page 473-480. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to recommender systems handbook, , and . Springer, (2011)User Feedback Analysis for Mobile Malware Detection., , , , and . ICISSP, page 83-94. SciTePress, (2017)A hybrid approach for fault detection in autonomous physical agents., , and . AAMAS, page 941-948. IFAAMAS/ACM, (2014)An Overview of IDS Using Anomaly Detection., and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Leveraging metadata to recommend keywords for academic papers, , and . Journal of the Association for Information Science and Technology, 67 (12): 3073--3091 (December 2016)Information Retrieval System for Medical Narrative Reports., , and . FQAS, volume 3055 of Lecture Notes in Computer Science, page 217-228. Springer, (2004)Source Model Selection for Deep Learning in the Time Series Domain., and . IEEE Access, (2020)Mobile security and privacy: Advances, challenges and future research directions., , and . Pervasive Mob. Comput., (2016)Classification Trees., and . Data Mining and Knowledge Discovery Handbook, Springer, (2010)Ensemble methods for improving the performance of neighborhood-based collaborative filtering., , , , and . RecSys, page 261-264. ACM, (2009)