Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Indoor Location Prediction Using Multiple Wireless Received Signal Strengths., , , and . AusDM, volume 87 of CRPIT, page 187-192. Australian Computer Society, (2008)Preference Networks: Probabilistic Models for Recommendation Systems., , and . AusDM, volume 70 of CRPIT, page 195-202. Australian Computer Society, (2007)MGAN: Training Generative Adversarial Nets with Multiple Generators., , , and . ICLR (Poster), OpenReview.net, (2018)A Slice Sampler for Restricted Hierarchical Beta Process with Applications to Shared Subspace Learning., , and . UAI, page 316-325. AUAI Press, (2012)AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities., , , , , , and . Empir. Softw. Eng., 29 (1): 4 (February 2024)Bayesian Nonparametric Multilevel Clustering with Group-Level Contexts., , , , and . CoRR, (2014)A Capsule Network-based Embedding Model for Knowledge Graph Completion and Search Personalization., , , , and . CoRR, (2018)High level segmentation of instructional videos based on content density., , and . ACM Multimedia, page 295-298. ACM, (2002)Tree-based iterated local search for Markov random fields with applications in image analysis., , and . CoRR, (2014)Cumulative Restricted Boltzmann Machines for Ordinal Matrix Data Analysis., , and . CoRR, (2014)