Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating the Maximum Likelihood Alternative to TD(lambda)., , and . ICML, page 403-410. Morgan Kaufmann, (2002)Monte Carlo Matrix Inversion Policy Evaluation, and . CoRR, (2012)Reducing adolescent obesity with a mobile fitness application: Study results of youth age 15 to 17., , and . Healthcom, page 554-558. IEEE, (2013)Improving adolescent fitness attitudes with a mobile fitness game to combat obesity in youth., and . IGIC, page 148-151. IEEE, (2013)An Anomaly Detection Model for Ultra Low Powered Wireless Sensor Networks Utilizing Attributes of IEEE 802.15.4e/TSCH., and . J. Commun., 14 (5): 335-341 (2019)Model-Based Least-Squares Policy Evaluation., and . AI, volume 2671 of Lecture Notes in Computer Science, page 342-352. Springer, (2003)Reducing adolescent obesity with a social networking mobile fitness application., and . Healthcom, page 429-434. IEEE, (2014)Uncovering Fraud in Direct Marketing Data with a Fraud Auditing Case Builder.. PKDD, volume 4702 of Lecture Notes in Computer Science, page 540-547. Springer, (2007)Adaptive Fraud Detection Using Benford's Law., , and . Canadian AI, volume 4013 of Lecture Notes in Computer Science, page 347-358. Springer, (2006)Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford's Law Distributions., and . ECML, volume 3720 of Lecture Notes in Computer Science, page 633-640. Springer, (2005)