Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering Multi-stage Attacks Using Closed Multi-dimensional Sequential Pattern Mining., and . DEXA (2), volume 8056 of Lecture Notes in Computer Science, page 450-457. Springer, (2013)Yet Another Approach for Completing Missing Values., and . CLA, volume 4923 of Lecture Notes in Computer Science, page 155-169. Springer, (2006)Extracting Compact and Information Lossless Set of Fuzzy Association Rules., and . FUZZ-IEEE, page 1-6. IEEE, (2007)On the efficient stability computation for the selection of interesting formal concepts., and . Inf. Sci., (2019)Mono-objective and multi-objective models for the pickup and delivery problem with time windows., , and . CSCWD, page 103-108. IEEE, (2015)Distributed Scalable Association Rule Mining over Covid-19 Data., , , , and . FDSE, volume 13076 of Lecture Notes in Computer Science, page 39-52. Springer, (2021)When time meets information retrieval: Past proposals, current plans and future trends., , and . J. Inf. Sci., 42 (6): 725-747 (2016)Preface: Special Issue on Big Data., , and . Fuzzy Sets Syst., (2018)Interpretable machine learning for heterogeneous treatment effect estimators with Double ML: a case of access to credit for SMEs., , , and . KES, volume 225 of Procedia Computer Science, page 2163-2172. Elsevier, (2023)OACAS - Ontologies Alignment using Composition and Aggregation of Similarities., , , and . KEOD, page 233-238. INSTICC Press, (2009)