Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an Adaptive Approach for Mining Data Streams in Resource Constrained Environments., , and . DaWaK, volume 3181 of Lecture Notes in Computer Science, page 189-198. Springer, (2004)Mobile Activity Recognition Using Ubiquitous Data Stream Mining., , , , and . DaWaK, volume 7448 of Lecture Notes in Computer Science, page 130-141. Springer, (2012)Deep reward shaping from demonstrations., , , and . IJCNN, page 510-517. IEEE, (2017)Adaptive One-Class Ensemble-based Anomaly Detection: An Application to Insider Threats., and . IJCNN, page 1-9. IEEE, (2018)OntoPeFeGe: Ontology-Based Personalized Feedback Generator., , and . IEEE Access, (2018)Enabling Scalable Semantic Reasoning for Mobile Services., , and . Int. J. Semantic Web Inf. Syst., 5 (2): 91-116 (2009)A Replicator Dynamics Approach to Collective Feature Engineering in Random Forests., , and . SGAI Conf., page 25-41. Springer, (2015)Mining data streams: a review., , and . SIGMOD Record, 34 (2): 18-26 (2005)Cost efficient, adaptive reasoning strategies for pervasive service discovery., , and . ICPS, page 11-20. ACM, (2009)RED-GENE: An Evolutionary Game Theoretic Approach to Adaptive Data Stream Classification., , and . IEEE Access, (2019)