Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Highlighting disputed claims on the web., , and . WWW, page 341-350. ACM, (2010)What is disputed on the web?, , , and . WICOW, page 67-74. ACM, (2010)A Lightweight Inference Method for Image Classification., and . UAI Application Workshops, volume 1024 of CEUR Workshop Proceedings, page 50-57. CEUR-WS.org, (2013)Workshop summary: Seventh annual workshop on Bayes applications., , , , , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 3. ACM, (2009)Mixture Models of Endhost Network Traffic, , , , and . CoRR, (2012)Iterative Model Refinement of Recommender MDPs Based on Expert Feedback., , and . ECML/PKDD (1), volume 8188 of Lecture Notes in Computer Science, page 162-177. Springer, (2013)A distributed host-based worm detection system., , , , , and . LSAD@SIGCOMM, page 107-113. ACM, (2006)The structure of bayes networks for visual recognition.. UAI, page 397-406. North-Holland, (1988)Constraining Influence Diagram Structure by Generative Planning: An Application to the Optimization of Oil Spill Response.. UAI, page 11-19. Morgan Kaufmann, (1996)Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 231-250. Springer, (2008)