Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limn Matrix: A Tool for Visualizing Large, Distributed, High-Dimension Data Sets., , and . CAINE, page 263-268. ISCA, (2005)Lightweight agents for intrusion detection., , , , and . J. Syst. Softw., 67 (2): 109-122 (2003)An Accuracy Model for Relational Databases., , and . CATA, page 225-230. ISCA, (2007)A Polynomial Time Algorithm for Testing Implications of a Join Dependency and Embodied Functional Dependencies., , and . SIGMOD Conference, page 218-224. ACM Press, (1988)SIGMOD Record 17(3), September 1988.Enriching STEM education through personalization and teaching collaboration., , , and . PerCom Workshops, page 543-549. IEEE Computer Society, (2011)Automated discovery of concise predictive rules for intrusion detection., , , and . J. Syst. Softw., 60 (3): 165-175 (2002)Guest Editor's Notes., and . Int. J. Comput. Their Appl., 21 (3): 141 (2014)Comparing Strategies for Evaluating Older Adults to Improve Web Accessibility., , and . CATA, page 13-18. ISCA, (2009)Towards the automatic generation of mobile agents for distributed intrusion detection system., , , , , , , and . J. Syst. Softw., 79 (1): 1-14 (2006)A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System., , , , , and . Requir. Eng., 7 (4): 207-220 (2002)