Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Survey of Data Mining-based Fraud Detection Research, , , and . CoRR, (2005)An integrated framework for human activity classification., , , , and . UbiComp, page 331-340. ACM, (2012)Multiple People Activity Recognition Using MHT over DBN., , , and . ICOST, volume 6719 of Lecture Notes in Computer Science, page 313-318. Springer, (2011)Multiple People Activity Recognition using Simple Sensors., , and . PECCS, page 224-231. SciTePress, (2011)Where Will You Go? Mobile Data Mining for Next Place Prediction., , and . DaWaK, volume 8057 of Lecture Notes in Computer Science, page 146-158. Springer, (2013)An integrated framework for human activity recognition., , , , and . UbiComp, page 621-622. ACM, (2012)Communal Detection of Implicit Personal Identity Streams., , , and . ICDM Workshops, page 620-625. IEEE Computer Society, (2006)Activity recognition using correlated pattern mining for people with dementia., , , , and . EMBC, page 7593-7597. IEEE, (2011)Adaptive communal detection in search of adversarial identity crime, , , and . DDDM '07: Proceedings of the 2007 international workshop on Domain driven data mining, page 1--10. (2007)Temporal Representation in Spike Detection of Sparse Personal Identity Streams., , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 115-126. Springer, (2006)