Author of the publication

Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool.

, , , , , and . AVI, page 108-111. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disentangling Space and Time in Video with Hierarchical Variational Auto-encoders., and . CoRR, (2016)Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool., , , , , and . AVI, page 108-111. ACM, (2016)Using trajectory data to improve bayesian optimization for reinforcement learning., , and . J. Mach. Learn. Res., 15 (1): 253-282 (2014)Do Large Code Models Understand Programming Concepts? A Black-box Approach., , , , , and . CoRR, (2024)Harnessing curiosity to increase correctness in end-user programming., , , , , , , and . CHI, page 305-312. ACM, (2003)Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , and . AAAI, page 3912-3919. AAAI Press, (2015)A Bayesian Approach for Policy Learning from Trajectory Preference Queries., , and . NIPS, page 1142-1150. (2012)On Mobile Agent Based Transactions in Moderately Hostile Environments., , and . Network Security, volume 206 of IFIP Conference Proceedings, page 173-186. Kluwer, (2001)Transfer Learning in Sequential Decision Problems: A Hierarchical Bayesian Approach., , and . ICML Unsupervised and Transfer Learning, volume 27 of JMLR Proceedings, page 217-227. JMLR.org, (2012)Open Voting Client Architecture and Op-Ed Voting for Secret Ballot Elections., , and . ACR, volume 700 of Lecture Notes in Networks and Systems, page 381-392. Springer, (2023)