Author of the publication

Fixing the program my computer learned: barriers for end users, challenges for the machine.

, , , , , , , and . IUI, page 187-196. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What's Strange About Recent Events, , , and . Journal of Urban Health, (June 2003)Supplement 1.An Ensemble Learning and Problem Solving Architecture for Airspace Management., , , , , , , , , and 27 other author(s). IAAI, AAAI, (2009)Implementation of a Gaussian process-based machine learning grasp predictor., , , and . Auton. Robots, 40 (4): 687-699 (2016)Towards recognizing "cool": can end users help computer vision recognize subjective attributes of objects in images?, , , , , , , and . IUI, page 285-288. ACM, (2012)Integrating rich user feedback into intelligent user interfaces., , , , , and . IUI, page 50-59. ACM, (2008)Machine learning algorithms for event detection., , and . Mach. Learn., 79 (3): 257-259 (2010)Discovering Anomalies by Incorporating Feedback from an Expert., , , , and . ACM Trans. Knowl. Discov. Data, 14 (4): 49:1-49:32 (2020)IoT Device Type Identification Using Hybrid Deep Learning Approach for Increased IoT Security., , and . IWCMC, page 565-570. IEEE, (2020)Bayesian Network Anomaly Pattern Detection for Disease Outbreaks, , , and . Proceedings of the Twentieth International Conference on International Conference on Machine Learning, page 808--815. AAAI Press, (2003)Deep Learning Model Portability for Domain-Agnostic Device Fingerprinting., , , and . IEEE Access, (2023)