Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Nash and the bandit approaches for adversarial portfolios., and . CIG, page 1-7. IEEE, (2014)Fully Parallel Hyperparameter Search: Reshaped Space-Filling., , , , , , , and . CoRR, (2019)Toward Optimal Run Racing: Application to Deep Learning Calibration., , , , , , and . CoRR, (2017)Upper Confidence Tree-Based Consistent Reactive Planning Application to MineSweeper., and . LION, volume 7219 of Lecture Notes in Computer Science, page 220-234. Springer, (2012)Slightly Beyond Turing's Computability for Studying Genetic Programming.. MCU, volume 4664 of Lecture Notes in Computer Science, page 279-290. Springer, (2007)Inspirational Adversarial Image Generation., , , , and . CoRR, (2019)Bounds on the Generalization Ability of Bayesian Inference and Gibbs Algorithms., and . ICANN, volume 2130 of Lecture Notes in Computer Science, page 265-270. Springer, (2001)Kernel Based Image Classification., and . ICANN, volume 2130 of Lecture Notes in Computer Science, page 369-375. Springer, (2001)Lower Bounds for Training and Leave-One-Out Estimates of the Generalization Error., and . ICANN, volume 2415 of Lecture Notes in Computer Science, page 583-588. Springer, (2002)T2FS-Based Adaptive Linguistic Assessment System for Semantic Analysis and Human Performance Evaluation on Game of Go., , , , and . IEEE Trans. Fuzzy Syst., 23 (2): 400-420 (2015)