Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Dependence in Second-Order Probability., and . SUM, volume 7520 of Lecture Notes in Computer Science, page 379-391. Springer, (2012)Eliciting Structures in Data., , , , , , , , , and 2 other author(s). IUI Workshops, volume 2327 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)A framework for identifying and evaluating technologies of interest for effective business strategy: Using text analytics to augment technology forecasting., , and . ISCBI, page 110-115. IEEE, (2017)On evidential combination rules for ensemble classifiers., , and . FUSION, page 1-8. IEEE, (2008)Artificial Intelligence., , , and . Data Science in Practice, volume 46 of Studies in Big Data, Springer, (2019)An Infinite Replicated Softmax Model for Topic Modeling., , , and . MDAI, volume 11676 of Lecture Notes in Computer Science, page 307-318. Springer, (2019)Short Text Topic Modeling to Identify Trends on Wearable Bio-Sensors in Different Media Type., , , , and . ISCBI, page 89-93. IEEE, (2018)Topic modeling for anomaly detection in telecommunication networks., , , and . J. Ambient Intell. Humaniz. Comput., 14 (11): 15085-15096 (2023)An Empirical Comparison of Bayesian and Credal Set Theory for Discrete State Estimation., , and . IPMU (1), volume 80 of Communications in Computer and Information Science, page 80-89. Springer, (2010)Traceable Uncertainty for Threat Evaluation in Air to Ground Scenarios., and . SCAI, volume 257 of Frontiers in Artificial Intelligence and Applications, page 255-264. IOS Press, (2013)