Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some Remarks on the Concept of Approximations from the View of Knowledge Engineering., , and . Int. J. Cogn. Informatics Nat. Intell., 4 (2): 1-11 (2010)From topology to anti-reflexive topology., , , and . FUZZ-IEEE, page 1-7. IEEE, (2013)Granular computing: From topology to category theories based models.. SMC, page 2741-2746. IEEE, (2008)Managing Information Flows on Discretionary Access Control Models.. SMC, page 4759-4762. IEEE, (2006)Patterns in Numerical Data: Practical Approximations to Kolmogorov Complexity.. RSFDGrC, volume 1711 of Lecture Notes in Computer Science, page 509-513. Springer, (1999)Attribute Based Data Model and Polyinstantiation.. IFIP Congress (2), volume A-13 of IFIP Transactions, page 472-478. North-Holland, (1992)Sampling in association rule mining.. Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 5433 of SPIE Proceedings, page 161-167. SPIE, (2004)Granular Computing, Computer Security andWeb Intelligence.. COMPSAC (1), page 22-23. IEEE Computer Society, (2006)Chinese wall security policies information flows in business cloud.. IEEE BigData, page 1603-1607. IEEE Computer Society, (2015)Stochastic Finite Automata for the translation of DNA to protein., and . IEEE BigData, page 1060-1067. IEEE Computer Society, (2014)