From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Discovering Tutorial Dialogue Strategies with Hidden Markov Models, , , , , и . Proceeding of the 2009 conference on Artificial Intelligence in Education: Building Learning Systems that Care: From Knowledge Representation to Affective Modelling, стр. 141--148. Amsterdam, The Netherlands, The Netherlands, IOS Press, (2009)Factors Influencing ATM Adapter Throughput., , , , и . Multimedia Tools Appl., 2 (3): 253-271 (1996)A Lost Cell Recovery Technique Using Convolutional Coding at the ATM Adaptation Layer in B-ISDN/ATM., , и . Data Communication Networks and their Performance, том C-21 из IFIP Transactions, стр. 141-159. North-Holland, (1993)Diversity-based detection of security anomalies., и . HotSoS, стр. 29. ACM, (2014)On Reliability Analysis of Open Source Software - FEDORA., и . ISSRE, стр. 325-326. IEEE Computer Society, (2008)Efficiently Extracting Operational Profiles from Execution Logs Using Suffix Arrays., , и . ISSRE, стр. 41-50. IEEE Computer Society, (2009)Towards a Unifying Approach in Understanding Security Problems., и . ISSRE, стр. 136-145. IEEE Computer Society, (2009)Message from the steering committee and general chairs., и . NCA, стр. xiii. IEEE Computer Society, (2016)Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models., , , , , , и . Intelligent Tutoring Systems (1), том 6094 из Lecture Notes in Computer Science, стр. 55-64. Springer, (2010)A Model for Sharing of Confidential Provenance Information in a Query Based System., и . IPAW, том 5272 из Lecture Notes in Computer Science, стр. 62-69. Springer, (2008)