Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Decision Tables to Expert System Shells., and . Data Knowl. Eng., 13 (3): 265-282 (1994)Failure prediction with self organizing maps., , , and . Expert Syst. Appl., 30 (3): 479-487 (2006)A dynamic understanding of customer behavior processes based on clustering and sequence mining., , , and . Expert Syst. Appl., 41 (10): 4648-4657 (2014)Improving a neuro-fuzzy classifier using exploratory factor analysis., , , and . Int. J. Intell. Syst., 15 (8): 785-800 (2000)A Data Miner's Approach to Country Corruption Analysis., , and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)Advanced Care-Flow Mining and Analysis., , , and . Business Process Management Workshops (1), volume 99 of Lecture Notes in Business Information Processing, page 167-168. Springer, (2011)Specifying Process-Aware Access Control Rules in SBVR., , and . RuleML, volume 4824 of Lecture Notes in Computer Science, page 39-52. Springer, (2007)Leveraging process discovery with trace clustering and text mining for intelligent analysis of incident management processes., , , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)An empirical assessment of kernel type performance for least squares support vector machine classifiers., , , , , , and . KES, page 313-316. IEEE, (2000)Forecasting and analyzing insurance companies' ratings, , , , , and . International Journal of Forecasting, 23 (3): 513--529 (00 2007)