Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Software Engineering Process to Specify and Verify E-Commerce Systems., , , , , and . Software Engineering Research and Practice, page 419-425. CSREA Press, (2003)Particle swarm optimization for multi-label classification., , and . GECCO (Companion), page 17-18. ACM, (2011)Maximal termsets as a query structuring mechanism., , , and . CIKM, page 287-288. ACM, (2005)Set-based model: a new approach for information retrieval., , , and . SIGIR, page 230-237. ACM, (2002)Spam detection using web page content: a new battleground., , , , , , , , and . CEAS, page 83-91. ACM, (2011)An Evolutionary Methodology for Handling Data Scarcity and Noise in Monitoring Real Events from Social Media Data., , , , , and . IBERAMIA, volume 8864 of Lecture Notes in Computer Science, page 295-306. Springer, (2014)Analyzing robot behavior in e-business sites., , , , , and . SIGMETRICS/Performance, page 338-339. ACM, (2001)Ego-Centric Analysis of Supportive Networks., , , and . WebSci, page 281-285. ACM, (2018)Characterizing the effectiveness of twitter hashtags to detect and track online population sentiment., , , , , and . CHI Extended Abstracts, page 2621-2626. ACM, (2012)Mining Frequent Itemsets in Evolving Databases., , , , , and . SDM, page 494-510. SIAM, (2002)