Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Spam Detection Based on Structural Similarity., , , , , and . SRUTI, USENIX Association, (2005)When is social computation better than the sum of its parts?, , and . CoRR, (2011)A symmetry-breaking generative model of a simple-cell/complex-cell hierarchy., , and . SSIAI, page 89-92. IEEE Computer Society, (2012)Towards Real Time Epidemiology: Data Assimilation, Modeling and Anomaly Detection of Health Surveillance Data Streams., , , , and . BioSurveillance, volume 4506 of Lecture Notes in Computer Science, page 79-90. Springer, (2007)Quantifying Social and Opportunistic Behavior in Email Networks., , , , and . Adv. Complex Syst., 12 (1): 99-112 (2009)Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks., , and . DCOSS, volume 4549 of Lecture Notes in Computer Science, page 223-239. Springer, (2007)Model Cortical Association Fields Account for the Time Course and Dependence on Target Complexity of Human Contour Perception., , , , , , , , , and . PLoS Comput. Biol., (2011)Quantitative Methods for the Comparative Analysis of Cities in History., and . Frontiers Digit. Humanit., (2019)Cooperative searching for stochastic targets, , and . CoRR, (2011)Evaluating the Contribution of Top-Down Feedback and Post-Learning Reconstruction., and . BICA, volume 233 of Frontiers in Artificial Intelligence and Applications, page 9-15. IOS Press, (2011)