Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recommendations meet web browsing: enhancing collaborative filtering using internet browsing logs., , and . ICDE, page 1230-1238. IEEE Computer Society, (2016)When actions speak louder than clicks: a combined model of purchase probability and long-term customer satisfaction., , and . RecSys, page 287-295. ACM, (2019)A framework for a video analysis tool for suspicious event detection., , and . MDM@KDD, page 79-84. ACM, (2005)Inverted index compression via online document routing., , , and . WWW, page 487-496. ACM, (2011)Access control, confidentiality and privacy for video surveillance databases., , , , and . SACMAT, page 1-10. ACM, (2006)Understanding events in video.. Technion - Israel Institute of Technology, Israel, (2012)Propagating Uncertainty in Petri Nets for Activity Recognition., , and . ISVC (2), volume 6454 of Lecture Notes in Computer Science, page 706-715. Springer, (2010)Building Petri Nets from Video Event Ontologies., , , and . ISVC (1), volume 4841 of Lecture Notes in Computer Science, page 442-451. Springer, (2007)Improving ECG Classification Using Generative Adversarial Networks., , , and . AAAI, page 13280-13285. AAAI Press, (2020)Cross-Cultural Transfer Learning for Text Classification., , , and . EMNLP/IJCNLP (1), page 3871-3881. Association for Computational Linguistics, (2019)