Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content-based data leakage detection using extended fingerprinting, , and . CoRR, (2013)Using Wikipedia to Boost SVD Recommender Systems, , , and . CoRR, (2012)Evaluation of the real and perceived value of automatic and interactive query expansion, , and . SIGIR '04: Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, page 526--527. New York, NY, USA, ACM, (2004)Online Budgeted Learning for Classifier Induction., , , and . CoRR, (2019)RecSys Challenge 2015 and the YOOCHOOSE Dataset., , , , , and . RecSys, page 357-358. ACM, (2015)Using the Information Structure Model to Compare Profile-Based Information Filtering Systems., , and . Inf. Retr., 6 (1): 75-97 (2003)Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories., , , and . RecSys Posters, volume 1688 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , and . GCAI, volume 55 of EPiC Series in Computing, page 215-228. EasyChair, (2018)Transfer Learning for Time Series Classification Using Synthetic Data Generation., , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 232-246. Springer, (2022)Meta-learning for Selecting a Multi-label Classification Algorithm., , and . ICDM Workshops, page 220-227. IEEE Computer Society, (2011)