Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Overview of IDS Using Anomaly Detection., and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)A hybrid approach for fault detection in autonomous physical agents., , and . AAMAS, page 941-948. IFAAMAS/ACM, (2014)Source Model Selection for Deep Learning in the Time Series Domain., and . IEEE Access, (2020)Classification Trees., and . Data Mining and Knowledge Discovery Handbook, Springer, (2010)Leveraging metadata to recommend keywords for academic papers, , and . Journal of the Association for Information Science and Technology, 67 (12): 3073--3091 (December 2016)Introduction to recommender systems handbook, , and . Springer, (2011)User Feedback Analysis for Mobile Malware Detection., , , , and . ICISSP, page 83-94. SciTePress, (2017)Ensemble methods for improving the performance of neighborhood-based collaborative filtering., , , , and . RecSys, page 261-264. ACM, (2009)Information Retrieval System for Medical Narrative Reports., , and . FQAS, volume 3055 of Lecture Notes in Computer Science, page 217-228. Springer, (2004)Attribute-Driven Hidden Markov Model Trees for Intention Prediction., , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1103-1119 (2012)