Author of the publication

Protocol Specification Inference Based on Keywords Identification.

, , , and . ADMA (2), volume 8347 of Lecture Notes in Computer Science, page 443-454. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kernel-based data fusion improves the drug-protein interaction prediction., , , and . Comput. Biol. Chem., 35 (6): 353-362 (2011)Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems., , , and . IEEE ICCI, page 538-541. IEEE Computer Society, (2009)Digital Watermark Based on Wavelet Transform for Audio Signals., , and . WAA, page 733-. World Scientific, (2003)Big Data LifeCycle: Threats and Security Model., , and . AMCIS, Association for Information Systems, (2015)Bandwidth-adaptive Clustering for Mobile Ad Hoc Networks., and . ICCCN, page 103-108. IEEE, (2007)A hybrid multi-swarm particle swarm optimization to solve constrained optimization problems., and . Frontiers Comput. Sci. China, 3 (1): 38-52 (2009)Disease Candidate Gene Identification and Gene Regulatory Network Building Through Medical Literature Mining., , , and . ITITS (2), volume 455 of Advances in Intelligent Systems and Computing, page 453-461. (2015)Impact of E-Visits on Emergency Departments and Urgent Care Centers., , , , , , , and . AMCIS, Association for Information Systems, (2017)Spectrum-Based Fault Localization via Enlarging Non-Fault Region to Improve Fault Absolute Ranking., , , and . IEEE Access, (2018)Registration Algorithms of Dental Cast Based on 3D Point-Cloud., , , and . ICICA (2), volume 244 of Communications in Computer and Information Science, page 233-240. Springer, (2011)