Author of the publication

Goal Programming Approaches to Support Vector Machines.

, , , and . KES, volume 2773 of Lecture Notes in Computer Science, page 356-363. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Cluster-Based Routing Protocol Using Message Success Rate in Sensor Networks., and . HPCC, page 622-627. IEEE, (2011)A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile Services., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 379-385. (2017)Total Margin Algorithms in Support Vector Machines., , and . IEICE Trans. Inf. Syst., 87-D (5): 1223-1230 (2004)Prediction of Business Failure by Total Margin Support Vector Machines., , , and . KES, volume 3213 of Lecture Notes in Computer Science, page 441-448. Springer, (2004)Hardware Transactional Memory Based on Abort Prediction and Adaptive Retry Policy for Multi-Core In-Memory Databases., , , , and . BigComp, page 367-374. IEEE Computer Society, (2018)A New Grid-Based Cloaking Scheme for Continuous Queries in Centralized LBS Systems., , , and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 345-352. Springer, (2013)Intelligent Context-Aware System Architecture in Pervasive Computing Environment., , and . ISPA, page 745-750. IEEE Computer Society, (2008)Linear Function Based Transformation Scheme for Preserving Database Privacy in Cloud Computing., , , and . ICPADS, page 498-503. IEEE Computer Society, (2013)A role of total margin in support vector machines., , and . IJCNN, page 2049-2053. IEEE, (2003)Clustering-Based Query Result Authentication for Encrypted Databases in Cloud., , , and . HPCC/CSS/ICESS, page 1076-1082. IEEE, (2014)