SET UNDER AUTHORITY - HENDERSON,KDD

被引:0
|
作者
COLLINS, RO
机构
关键词
D O I
10.1093/oxfordjournals.afraf.a098042
中图分类号
K9 [地理];
学科分类号
0705 ;
摘要
引用
收藏
页码:302 / 303
页数:2
相关论文
共 50 条
  • [1] SUDAN REPUBLIC - HENDERSON,KDD
    KYLE, K
    AFRICAN AFFAIRS, 1968, 67 (266) : 75 - 77
  • [2] SUDAN REPUBLIC - HENDERSON,KDD
    KHADDURI, M
    ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 1966, 367 (SEP): : 202 - 203
  • [3] SUDAN REPUBLIC - HENDERSON,KDD
    GRETTON, G
    INTERNATIONAL AFFAIRS, 1966, 42 (02) : 328 - 329
  • [4] SUDAN REPUBLIC - HENDERSON,KDD
    ABULUGHED, I
    INTERNATIONAL JOURNAL OF COMPARATIVE SOCIOLOGY, 1966, 7 (1-2) : 272 - 273
  • [5] Rough set approach to KDD
    Nguyen, Hung Son
    Skowron, Andrzej
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, 2008, 5009 : 19 - 20
  • [6] 'Set in authority'
    Dean, M
    UNIVERSITY OF TORONTO QUARTERLY, 1997, 67 (01) : 289 - 291
  • [7] Training all the KDD data set to classify and detect attacks
    Beghdad, Rachid
    NEURAL NETWORK WORLD, 2007, 17 (02) : 81 - 91
  • [8] A knowledge reduction method based on tolerance rough set theory in KDD
    Jin, HJ
    Wei, CH
    Wang, XR
    Wang, YL
    PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 629 - 634
  • [9] The NLM Value Set Authority Center
    Bodenreider, Olivier
    Duc Nguyen
    Chiang, Pishing
    Chuang, Philip
    Madden, Maureen
    Winnenburg, Rainer
    McClure, Rob
    Emrick, Steve
    D'Souza, Ivor
    MEDINFO 2013: PROCEEDINGS OF THE 14TH WORLD CONGRESS ON MEDICAL AND HEALTH INFORMATICS, PTS 1 AND 2, 2013, 192 : 1224 - 1224
  • [10] A Survey of Intrusion Detection Models based on NSL-KDD Data Set
    Thomas, Rajesh
    Pavithran, Deepa
    2018 FIFTH HCT INFORMATION TECHNOLOGY TRENDS (ITT): EMERGING TECHNOLOGIES FOR ARTIFICIAL INTELLIGENCE, 2018, : 286 - 291