Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology., , , and . Inf. Sci., 177 (2): 467-475 (2007)The data mining approach to automated software testing., , and . KDD, page 388-396. ACM, (2003)On Complex Fuzzy Sets., , , , and . FUZZ-IEEE, page 1160-1163. IEEE, (2001)A new approach for fuzzy clustering of Web documents., , , , and . FUZZ-IEEE, page 377-381. IEEE, (2004)Discovering regular groups of mobile objects using incremental clustering., , , , , , and . WPNC, page 197-205. IEEE, (2008)Automated Detection of Injected Faults in a Differential Equation Solver., and . HASE, page 263-264. IEEE Computer Society, (2004)Terrorist Detection System., , , , , , and . PKDD, volume 3202 of Lecture Notes in Computer Science, page 540-542. Springer, (2004)A New Approach to Improving Multilingual Summarization Using a Genetic Algorithm., , and . ACL, page 927-936. The Association for Computer Linguistics, (2010)Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)., , , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 244-255. Springer, (2005)Fuzzy linear systems., , and . Fuzzy Sets Syst., 96 (2): 201-209 (1998)