Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Process discovery in event logs: An application in the telecom industry., , , , and . Appl. Soft Comput., 11 (2): 1697-1710 (2011)Mining Massive Fine-Grained Behavior Data to Improve Predictive Analytics., , , and . MIS Q., 40 (4): 869-888 (2016)Process Mining as First-Order Classification Learning on Logs with Negative Events., , , , and . Business Process Management Workshops, volume 4928 of Lecture Notes in Computer Science, page 42-53. Springer, (2007)Corporate residence fraud detection., , , , , and . KDD, page 1650-1659. ACM, (2014)Manipulation Risks in Explainable AI: The Implications of the Disagreement Problem., , and . CoRR, (2023)Dance Hit Song Prediction., , and . CoRR, (2019)Customs fraud detection., , and . Pattern Anal. Appl., 23 (3): 1457-1477 (2020)Comprehensible credit scoring models using rule extraction from support vector machines., , , and . Eur. J. Oper. Res., 183 (3): 1466-1476 (2007)Disagreement amongst counterfactual explanations: How transparency can be deceptive., , and . CoRR, (2023)Mining software repositories for comprehensible software fault prediction models., , , , , and . J. Syst. Softw., 81 (5): 823-839 (2008)