From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation of the real and perceived value of automatic and interactive query expansion, , и . SIGIR '04: Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, стр. 526--527. New York, NY, USA, ACM, (2004)Using Wikipedia to Boost SVD Recommender Systems, , , и . CoRR, (2012)Content-based data leakage detection using extended fingerprinting, , и . CoRR, (2013)Online Budgeted Learning for Classifier Induction., , , и . CoRR, (2019)RecSys Challenge 2015 and the YOOCHOOSE Dataset., , , , , и . RecSys, стр. 357-358. ACM, (2015)Using the Information Structure Model to Compare Profile-Based Information Filtering Systems., , и . Inf. Retr., 6 (1): 75-97 (2003)Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories., , , и . RecSys Posters, том 1688 из CEUR Workshop Proceedings, CEUR-WS.org, (2016)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , и . GCAI, том 55 из EPiC Series in Computing, стр. 215-228. EasyChair, (2018)Transfer Learning for Time Series Classification Using Synthetic Data Generation., , , и . CSCML, том 13301 из Lecture Notes in Computer Science, стр. 232-246. Springer, (2022)Exploiting simultaneous usage of different wireless interfaces for security and mobility., , , , , , и . FGCT, стр. 21-26. IEEE, (2013)