Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scoped: Visualising the Scope Chain Within Source Code., , and . EuroVis (Short Papers), page 115-119. Eurographics Association, (2017)Feasibility study of utility-directed behaviour for computer game agents., , and . Advances in Computer Entertainment Technology, page 5. ACM, (2011)Anomaly Detection in Raw Audio Using Deep Autoregressive Networks., and . ICASSP, page 3597-3601. IEEE, (2019)Robot perception errors and human resolution strategies in situated human-robot dialogue., , and . Adv. Robotics, 31 (5): 243-257 (2017)Using a Socioeconomic Segregation Burn-in Model to Initialise an Agent-Based Model for Infectious Diseases., , and . J. Artif. Soc. Soc. Simul., (2018)Active learning for text classification with reusability., , and . Expert Syst. Appl., (2016)Deep learning at the shallow end: Malware classification for non-domain experts., , , and . Digit. Investig., (2018)Real-time bidding campaigns optimization using user profile settings., , and . Electron. Commer. Res., 23 (2): 1297-1322 (June 2023)The Deep Radial Basis Function Data Descriptor (D-RBFDD) Network: A One-Class Neural Network for Anomaly Detection., , and . IEEE Access, (2022)Stability of Topic Modeling via Matrix Factorization., , and . CoRR, (2017)