Author of the publication

Probabilistic Constraints for Robot Localization.

, , , and . EPIA, volume 9273 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining complex networks and data mining: why and how., , , , , , and . CoRR, (2016)Learning recurring concepts from data streams with a context-aware ensemble., , and . SAC, page 994-999. ACM, (2011)Feature Selection Algorithms to Improve Documents' Classification Performance., , , and . AWIC, volume 2663 of Lecture Notes in Computer Science, page 288-296. Springer, (2003)Mobile Activity Recognition Using Ubiquitous Data Stream Mining., , , , and . DaWaK, volume 7448 of Lecture Notes in Computer Science, page 130-141. Springer, (2012)Improving the Learning of Recurring Concepts through High-Level Fuzzy Contexts., , and . RSKT, volume 6401 of Lecture Notes in Computer Science, page 234-239. Springer, (2010)Integrating manufacturer and customer: The funSTEP way., , , and . BASYS, volume 130 of IFIP Conference Proceedings, page 403-412. Kluwer, (1998)Situation-Aware Data Stream Mining Service for Ubiquitous Applications., , and . Mobile Data Management, page 360-365. IEEE Computer Society, (2010)Probabilistic Constraint Programming for Parameters Optimisation of Generative Models., , , and . EPIA, volume 9273 of Lecture Notes in Computer Science, page 376-387. Springer, (2015)Probabilistic Constraints for Robot Localization., , , and . EPIA, volume 9273 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)Agent-Based Communication Security., , , and . MATES, volume 3187 of Lecture Notes in Computer Science, page 73-84. Springer, (2004)