Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploit keyword query semantics and structure of data for effective XML keyword search., and . ADC, volume 104 of CRPIT, page 133-140. Australian Computer Society, (2010)A LSTM and CNN Based Assemble Neural Network Framework for Arrhythmias Classification., , , , , and . ICASSP, page 1303-1307. IEEE, (2019)Mining more Gold From Web Page Hyperlinks., and . iiWAS, volume 183 of books@ocg.at, Austrian Computer Society, (2004)Feature-based recommendation framework on OLAP., and . ADC, volume 124 of CRPIT, page 81-88. Australian Computer Society, (2012)Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery., , , , , and . IEEE Trans. Ind. Informatics, 19 (4): 5593-5601 (April 2023)Structured content-aware discovery for improving XML data consistency., , , and . Inf. Sci., (2013)Natural Language Query Optimization and Translation in Chinese Database Systems., , , and . CODAS, page 340-351. Springer, (1999)FEAS: A full-time event aware scheduler for improving responsiveness., , and . ACSC, volume 122 of CRPIT, page 3-9. Australian Computer Society, (2012)Building consumer self-anonymity scalable payment protocol for Internet purchase., , and . RIDE, page 159-168. IEEE Computer Society, (2002)An energy-efficient data-driven power management for wireless sensor networks., and . DMSN, page 21-27. ACM, (2008)