Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Structural Signatures for Identifying Globins: the Intra-Subunit Electrostatic Interactions., , , , , , , and . WOB, page 157-160. (2003)Using Quantitative Information for Efficient Association Rule Generation., , , and . SBBD, page 361-374. CEFET-PB, (2000)Efficient, Accurate and Privacy-Preserving Data Mining for Frequent Itemsets in Distributed Databases., , , and . SBBD, page 281-292. UFAM, (2003)Performance Analysis of WWW Cache Proxy Hierarchies., , , and . J. Braz. Comp. Soc., (1998)Mining Redundant Industrial Alarm Occurrences with Association Rules Extraction and Complex Networks Modeling., , and . SEDE, page 281-288. ISCA, (2010)The Metric Dilemma: Competence-Conscious Associative Classification., , , and . SDM, page 918-929. SIAM, (2009)Characterizing Videos, Audience and Advertising in Youtube Channels for Kids., , , , , and . SocInfo (1), volume 10539 of Lecture Notes in Computer Science, page 341-359. Springer, (2017)An Integrated Big and Fast Data Analytics Platform for Smart Urban Transportation Management., , , , , , , , , and 9 other author(s). IEEE Access, (2019)Non-Intrusive Planning the Roadside Infrastructure for Vehicular Networks., , and . IEEE Trans. Intell. Transp. Syst., 17 (4): 938-947 (2016)Identifying Networks Vulnerable to IP Spoofing., , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 3170-3183 (2021)