Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Improving the Integrity of Peer Review., , and . Sci. Eng. Ethics, 24 (5): 1603-1610 (2018)Designing an Integrated Semantic Framework for Structured Opinion Summarization., and . ESWC, volume 8465 of Lecture Notes in Computer Science, page 885-894. Springer, (2014)Process Fragmentation: An Ontological Perspective., , , and . BMMDS/EMMSAD, volume 214 of Lecture Notes in Business Information Processing, page 184-199. Springer, (2015)The Application of Users' Collective Experience for Crafting Suitable Search Engine Query Recommendations., , and . CNSR, page 148-156. IEEE Computer Society, (2007)Attention Mechanism in Predictive Business Process Monitoring., , , , and . EDOC, page 181-186. IEEE, (2020)A Metrics-Driven Approach for Quality Assessment of Linked Open Data., , , and . J. Theor. Appl. Electron. Commer. Res., 9 (2): 64-79 (2014)A novel scalable intrusion detection system based on deep learning., and . Int. J. Inf. Sec., 20 (3): 387-403 (2021)Schema and content aware classification for predicting the sources containing an answer over corpus and knowledge graphs., , and . PeerJ Comput. Sci., (2022)Detecting life events from twitter based on temporal semantic features., , , and . Knowl. Based Syst., (2018)Using Attacks Ontology in Distributed Intrusion Detection System., and . SCSS (1), page 153-158. Springer, (2007)