Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Gaussian Measures for Efficient Constraint Based Clustering., and . CoRR, (2014)Trustingness & trustworthiness: A pair of complementary trust measures in a social network., , , and . ASONAM, page 549-554. IEEE Computer Society, (2016)Robust Feature Selection Technique Using Rank Aggregation., , and . Applied Artificial Intelligence, 28 (3): 243-257 (2014)Analysis of Barcode sequence features to find anomalies due to amplification Bias., , and . CoRR, (2014)Improved Feature Selection for Hematopoietic Cell Transplantation Outcome Prediction using Rank Aggregation., , and . FedCSIS, page 221-226. (2012)Using Taxonomies to Perform Aggregated Querying over Imprecise Data., , and . ICDM Workshops, page 989-996. IEEE Computer Society, (2010)The Ones that Got Away: False Negative Estimation Based Approaches for Gold Farmer Detection., , , , and . SocialCom/PASSAT, page 328-337. IEEE Computer Society, (2012)On The Convergence of ADAM-Type Algorithms for Solving Structured Single Node and Decentralized Min-Max Saddle Point Games., , , , and . ICASSP, page 4343-4347. IEEE, (2022)Impact of Density of Lab Data in EHR for Prediction of Potentially Preventable Events., and . ICHI, page 529-534. IEEE Computer Society, (2013)