From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases., , , и . Australasian Database Conference, том 17 из Australian Computer Science Communications, (1995)A Context-Aware Service Discovery Framework Based on Human Needs Model., , , и . ICSOC, том 4749 из Lecture Notes in Computer Science, стр. 404-409. Springer, (2007)Links between the personalities, styles and performance in computer programming., , , и . CoRR, (2016)Enriched LDA (ELDA): Combination of latent Dirichlet allocation with word co-occurrence analysis for aspect extraction., и . Expert Syst. Appl., (2017)Cryptographic collusion-resistant protocols for secure sum., и . Int. J. Electron. Secur. Digit. Forensics, 9 (1): 19-34 (2017)A Novelty Detection Method Based on Frequent Itemsets., , , и . MLDM Posters, стр. 276-286. ibai Publishing, (2007)Electronic Promotion to New Customers using a Fixed link mkNN Learning., , , и . CSREA EEE, стр. 20-27. CSREA Press, (2007)A Model of Authorization for Object-Oriented Databases based on Object Views., , , и . DOOD, том 1013 из Lecture Notes in Computer Science, стр. 503-520. Springer, (1995)Modeling a multi-level secure object-oriented database using views., , и . ACISP, том 1172 из Lecture Notes in Computer Science, стр. 190-206. Springer, (1996)CEFER: A Four Facets Framework based on Context and Emotion embedded features for Implicit and Explicit Emotion Recognition., , и . CoRR, (2022)