From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Mobile Agent Based Transactions in Moderately Hostile Environments., , и . Network Security, том 206 из IFIP Conference Proceedings, стр. 173-186. Kluwer, (2001)Transfer Learning in Sequential Decision Problems: A Hierarchical Bayesian Approach., , и . ICML Unsupervised and Transfer Learning, том 27 из JMLR Proceedings, стр. 217-227. JMLR.org, (2012)Multi-task reinforcement learning: a hierarchical Bayesian approach., , , и . ICML, том 227 из ACM International Conference Proceeding Series, стр. 1015-1022. ACM, (2007)Open Voting Client Architecture and Op-Ed Voting for Secret Ballot Elections., , и . ACR, том 700 из Lecture Notes in Networks and Systems, стр. 381-392. Springer, (2023)Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , и . AAAI, стр. 3912-3919. AAAI Press, (2015)A Bayesian Approach for Policy Learning from Trajectory Preference Queries., , и . NIPS, стр. 1142-1150. (2012)Using trajectory data to improve bayesian optimization for reinforcement learning., , и . J. Mach. Learn. Res., 15 (1): 253-282 (2014)Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool., , , , , и . AVI, стр. 108-111. ACM, (2016)Disentangling Space and Time in Video with Hierarchical Variational Auto-encoders., и . CoRR, (2016)Harnessing curiosity to increase correctness in end-user programming., , , , , , , и . CHI, стр. 305-312. ACM, (2003)