Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps., , , , , , and . Comput. Secur., (2019)Temperature Forecast in Buildings Using Machine Learning Techniques., , , , , , and . ESANN, (2013)Machine Learning Techniques for Short-Term Electric Power Demand Prediction., , , , , , and . ESANN, (2013)SoC-Based Implementation of the Backpropagation Algorithm for MLP., , , , , , , and . HIS, page 744-749. IEEE Computer Society, (2008)Incidence Position Estimation in a PET Detector Using a Discretized Positioning Circuit and Neural Networks., , , , and . IWANN, volume 4507 of Lecture Notes in Computer Science, page 684-691. Springer, (2007)Dynamic classifier auditing by unsupervised anomaly detection methods: an application in packaging industry predictive maintenance., , , , , and . CoRR, (2024)Feature Selection for Footwear Shape Estimation., , , , , and . ESANN, (2013)Learning Structures in Earth Observation Data with Gaussian Processes., , , , and . AALTD@PKDD/ECML (Revised Selected Papers), volume 9785 of Lecture Notes in Computer Science, page 78-94. Springer, (2015)Multimodal video analysis for crowd anomaly detection using open access tourism cameras., , , , and . CoRR, (2024)Multi-step strategy for mortality assessment in cardiovascular risk patients with imbalanced data., , , , , and . ESANN, (2016)