Author of the publication

Extending Support Vector Regression to Constraint Optimization: Application to the Reduction of Potentially Avoidable Hospitalizations.

, , , , , and . Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML, volume 11329 of Lecture Notes in Computer Science, page 89-102. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Querying Fuzzy Multidimensional Databases: Unary Operators and Their Properties.. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 11 (Supplement-1): 31-46 (2003)Recherche de sous-structures fréquentes pour l'intégration de schémas XML., , , and . EGC, volume RNTI-E-6 of Revue des Nouvelles Technologies de l'Information, page 487-498. Cépaduès-Éditions, (2006)Extraction d'outliers dans des cubes de données : une aide à la navigation., , and . EDA, volume B-3 of RNTI, page 113-130. Cépaduès, (2007)Fouille de Données Multidimensionnelles : Différentes Stratégies pour Prendre en Compte la Mesure., , and . EDA, volume B-4 of RNTI, page 61-75. Cépaduès, (2008)PGLCM: efficient parallel mining of closed frequent gradual itemsets., , , , , and . Knowl. Inf. Syst., 43 (3): 497-527 (2015)Extraction de comportements inattendus dans le cadre du Web Usage Mining., , and . Fouille de données complexe, volume E-18 of RNTI, Hermann-Éditions, (2010)Strengthening fuzzy gradual rules through äll the more" clauses., , , and . FUZZ-IEEE, page 1-7. IEEE, (2010)Détection de séquences atypiques basée sur un modèle de Markov d'ordre variable., , and . EGC, volume RNTI-E-15 of Revue des Nouvelles Technologies de l'Information, page 217-228. Cépaduès-Éditions, (2009)Bases de données multidimensionnelles floues.. BDA, (2001)Mining Unexpected Web Usage Behaviors., , and . ICDM, volume 5077 of Lecture Notes in Computer Science, page 283-297. Springer, (2008)