Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding Fraud in Health Insurance Data with Two-Layer Outlier Detection Approach., and . DaWaK, volume 6862 of Lecture Notes in Computer Science, page 394-405. Springer, (2011)Modeling Navigation Patterns of Visitors of Unstructured Websites., , and . SGAI Conf., page 116-129. Springer, (2005)Analysing Clickstream Data: From Anomaly Detection to Visitor Profiling, and . Proceedings of Discovery Challenge 2005, page 21--30. New York, NY, USA, (2005)Approximate algorithms for generalized maximum utility problems., and . J. Exp. Theor. Artif. Intell., 10 (1): 49-62 (1998)Balancing word lists in speech audiometry through large spoken language corpora., , , , , and . INTERSPEECH, page 3613-3616. ISCA, (2013)On the Performance of Oversampling Techniques for Class Imbalance Problems., , , , and . PAKDD (2), volume 12085 of Lecture Notes in Computer Science, page 84-96. Springer, (2020)Fuzzy clustering for Optimally Weighted Cluster Kriging., , , , and . FUZZ-IEEE, page 939-945. IEEE, (2016)From Xception to NEXcepTion: New Design Decisions and Neural Architecture Search., , , and . CoRR, (2022)Cluster-based Kriging approximation algorithms for complexity reduction., , , , and . Appl. Intell., 50 (3): 778-791 (2020)Cluster-based Kriging Approximation Algorithms for Complexity Reduction., , , , and . CoRR, (2017)