Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of emerging space-time clusters., , , and . KDD, page 218-227. ACM, (2005)Bayesian Networks for Lossless Dataset Compression., and . KDD, page 387-391. ACM, (1999)A Tractable Approach to Finding Closest Truncated-commute-time Neighbors in Large Graphs, and . CoRR, (2012)Traffic Classification Using a Statistical Approach., and . PAM, volume 3431 of Lecture Notes in Computer Science, page 321-324. Springer, (2005)Multiresolution Instance-Based Learning., and . IJCAI, page 1233-1242. Morgan Kaufmann, (1995)A PCIe DMA engine to support the virtualization of 40 Gbps FPGA-accelerated network appliances., , , and . ReConFig, page 1-6. IEEE, (2015)Collaborating with the Enemy on Network Management., , , , , , , , and . Security Protocols Workshop, volume 8809 of Lecture Notes in Computer Science, page 154-162. Springer, (2014)Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries., , , and . ICML, page 392-399. AAAI Press, (2003)Distributed Value Functions., , , and . ICML, page 371-378. Morgan Kaufmann, (1999)A Nonparametric Approach to Noisy and Costly Optimization., , and . ICML, page 17-24. Morgan Kaufmann, (2000)