Rakesh Verma, Rakesh M. Verma, RM Verma, R Verma
Rakesh Verma, Rakesh M. Verma, RM Verma, R Verma
Professor of Computer Science, University of Houston
確認したメール アドレス: uh.edu - ホームページ
An efficient multiversion access structure
PJ Varman, RM Verma
Knowledge and Data Engineering, IEEE Transactions on 9 (3), 391-409, 1997
Detecting Phishing Emails the Natural Language Way
R Verma, N Shashidhar, N Hossain
European Symp. on Research in Computer Security, 824-841, 2012
On the character of phishing URLs: Accurate and robust statistical learning classifiers
R Verma, K Dyer
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
A query-based medical information summarization system using ontology knowledge
P Chen, R Verma
Proceedings of the IEEE 2006 Symposium on Computer-Based Medical Systems …, 2006
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain
US Patent App. 14/015,524, 2015
Combining syntax and semantics for automatic extractive single-document summarization
A Barrera, R Verma
Computational Linguistics and Intelligent Text Processing, 366-377, 2012
Term matching on parallel computers
R Ramesh, RM Verma, T Krishnaprasad, IV Ramakrishnan
The Journal of Logic Programming 6 (3), 213-228, 1989
A Semantic Free-text Summarization System Using Ontology Knowledge
R Verma, P Chen, W Lu
What's in a URL: Fast Feature Extraction and Malicious URL Detection
R Verma, A Das
IWSPA, 2017
An analysis of a good algorithm for the subtree problem, corrected
RM Verma, SW Reyner
SIAM Journal on Computing 18 (5), 906-908, 1989
Semantic feature selection for text with application to phishing email detection
R Verma, N Hossain
International Conference on Information Security and Cryptology, 455-468, 2013
Local and symbolic bisimulation using tabled constraint logic programming
S Basu, M Mukund, CR Ramakrishnan, IV Ramakrishnan, R Verma
International Conference on Logic Programming, 166-180, 2001
Tight bounds for prefetching and buffer management algorithms for parallel I/O systems
PJ Varman, RM Verma
Parallel and Distributed Systems, IEEE Transactions on 10 (12), 1262-1275, 1999
RPO constraint solving is in NP
P Narendran, M Rusinowitch, R Verma
Computer Science Logic, 385-398, 1998
On the confluence of linear shallow term rewrite systems
G Godoy, A Tiwari, R Verma
STACS, 85-96, 2003
The embodied nature of narrative knowledge: A cross-study analysis of embodied knowledge in teaching, learning, and life
C Craig, J You, Y Zou, R Verma, D Stokes, P Evans, G Curtis
Teaching and Teacher Education 71 (329), e340, 2018
The influence of parents on undergraduate and graduate entering the STEM disciplines and STEM careers
C Craig, R Verma, D Stokes, P Evans, B Abrol
International Journal of Science Education, 2018
University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity
L Moraes, S Baki, R Verma, D Lee
BIRNDL, 2016
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain, N Rai
US Patent 10,404,745, 2019
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students
R Verma, M Kantarcioglou, D Marchette, E Leiss, T Solorio
IEEE Security and Privacy 13 (6), 60-65, 2015
論文 1–20