Author of the publication

Using Bandits for Effective Database Activity Monitoring.

, , , , and . PAKDD (2), volume 12085 of Lecture Notes in Computer Science, page 701-713. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content-based data leakage detection using extended fingerprinting, , and . CoRR, (2013)Using Wikipedia to Boost SVD Recommender Systems, , , and . CoRR, (2012)Evaluation of the real and perceived value of automatic and interactive query expansion, , and . SIGIR '04: Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, page 526--527. New York, NY, USA, ACM, (2004)RecSys Challenge 2015 and the YOOCHOOSE Dataset., , , , , and . RecSys, page 357-358. ACM, (2015)Online Budgeted Learning for Classifier Induction., , , and . CoRR, (2019)Using the Information Structure Model to Compare Profile-Based Information Filtering Systems., , and . Inf. Retr., 6 (1): 75-97 (2003)Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories., , , and . RecSys Posters, volume 1688 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , and . GCAI, volume 55 of EPiC Series in Computing, page 215-228. EasyChair, (2018)Transfer Learning for Time Series Classification Using Synthetic Data Generation., , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 232-246. Springer, (2022)Exploiting simultaneous usage of different wireless interfaces for security and mobility., , , , , , and . FGCT, page 21-26. IEEE, (2013)