Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint-based and hybrid structure learning of multidimensional continuous-time Bayesian network classifiers., , , , and . Int. J. Approx. Reason., (August 2023)Some numerical aspects of the training problem for feed-forward neural nets., , and . Neural Networks, 10 (8): 1455-1463 (1997)Hybrid Syntactic-Semantic Reranking for Parsing Results of ECAs Interactions Using CRFs., , and . IceTAL, volume 6233 of Lecture Notes in Computer Science, page 15-26. Springer, (2010)A Software System for Topic Extraction and Document Classification., , and . Web Intelligence, page 283-286. IEEE Computer Society, (2009)Analysing User Reviews in Tourism with Topic Models., , , and . ENTER, page 47-58. Springer, (2015)Counterfactual Contextual Multi-Armed Bandit to Diagnose Post-Harvest Diseases of Apple., , and . WI/IAT, page 241-248. ACM, (2021)Towards Explaining Latent Factors with Topic Models in Collaborative Recommender Systems., , and . DEXA Workshops, page 162-167. IEEE Computer Society, (2013)Multi-armed bandits for performance marketing., and . Int. J. Data Sci. Anal., 20 (1): 151-165 (June 2025)Bootstrap Your Conversions: Thompson Sampling for Partially Observable Delayed Rewards., and . UAI, volume 244 of Proceedings of Machine Learning Research, page 1438-1452. PMLR, (2024)Deep Reinforcement Learning for a Two-Echelon Supply Chain with Seasonal Demand., and . CoRR, (2022)