Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Use of Twitter to Track Levels of Disease Activity and Public Concern in the U.S. during the Influenza A H1N1 Pandemic, , and . PLoS ONE, 6 (5): e19467 (May 2011)Explanation-Based Learning of Generalized Robot Assembly Plans. University of Illinois Urbana-Champaign, USA, (1987)An Expert System For The Production Of Phoneme Strings From Unmarked English Text Using Machine-Induced Rules., , and . EACL, page 35-42. The Association for Computer Linguistics, (1983)AdaAX: Explaining Recurrent Neural Networks by Learning Automata with Adaptive States., , and . KDD, page 574-584. ACM, (2022)Predicting Elevated Risk of Hospitalization Following Emergency Department Discharges., , and . CoRR, (2024)Inferring Realistic Intra-hospital Contact Networks Using Link Prediction and Computer Logins., , , , , , and . SocialCom/PASSAT, page 572-578. IEEE Computer Society, (2012)A Large-Scale Experimental Study of Gender and Pair Composition in Pair Programming., , , and . ITiCSE, page 176-181. ACM, (2019)A High Throughput Approach to Combinatorial Search on Grids., , and . HPDC, page 351-352. IEEE, (2006)Privacy-Preserving Data Set Union., , , and . Privacy in Statistical Databases, volume 4302 of Lecture Notes in Computer Science, page 266-276. Springer, (2006)Getting the Most from Flawed Theories., , and . ICML, page 139-147. Morgan Kaufmann, (1994)