Author of the publication

Detecting of PIU Behaviors Based on Discovered Generators and Emerging Patterns from Computer-Mediated Interaction Events.

, , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 277-293. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph similarity search on large uncertain graph databases., , , and . VLDB J., 24 (2): 271-296 (2015)Schema Matching Based on Source Codes., , , and . DASFAA Workshops, volume 9052 of Lecture Notes in Computer Science, page 86-97. Springer, (2015)Camel: A Journey Group T-Pattern Mining System Based on Instagram Trajectory Data., , , and . DASFAA (2), volume 8422 of Lecture Notes in Computer Science, page 527-530. Springer, (2014)Large-Scale Graph Classification Based on Evolutionary Computation with MapReduce., , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 227-243. Springer, (2015)Detecting of PIU Behaviors Based on Discovered Generators and Emerging Patterns from Computer-Mediated Interaction Events., , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 277-293. Springer, (2014)Automatic Multi-schema Integration Based on User Preference., , , and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 704-716. Springer, (2010)Weight Based Live Migration of Virtual Machines., , , , , and . PAKDD Workshops, volume 7867 of Lecture Notes in Computer Science, page 543-554. Springer, (2013)Distributed Frequent Items Detection on Uncertain Data., , and . ADMA (1), volume 6440 of Lecture Notes in Computer Science, page 509-520. Springer, (2010)An Efficient P2P Range Query Processing Approach for Multi-dimensional Uncertain Data., , , , , and . DASFAA Workshops, volume 5667 of Lecture Notes in Computer Science, page 303-318. Springer, (2009)Efficiently Mapping Integrity Constraints from Relational Database to XML Document., , and . ADBIS, volume 2151 of Lecture Notes in Computer Science, page 338-351. Springer, (2001)