From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Kernel Based Sequential Data Anomaly Detection in Business Process Event Logs.. CoRR, (2015)Investigating the Role of Twitter in E-Governance by Extracting Information on Citizen Complaints and Grievances Reports., и . BDA, том 10721 из Lecture Notes in Computer Science, стр. 300-310. Springer, (2017)Setting the Foundation for Scientific Inquiry and Computational Thinking in Early Childhood using Lego Machines and Mechanism Education Kit, и . (21.12.2017)Empirical Analysis on Effectiveness of Source Code Metrics for Predicting Change-Proneness., , и . ISEC, стр. 4-14. ACM, (2017)Using Structured Text Source Code Metrics and Artificial Neural Networks to Predict Change Proneness at Code Tab and Program Organization Level., и . ISEC, стр. 172-180. ACM, (2017)Using tabu best-response search to find pure strategy nash equilibria in normal form games., и . AAMAS, стр. 1023-1029. ACM, (2005)Computing the outcome of proxy bidding in combinatorial auctions extended abstract., , и . EC, стр. 242-243. ACM, (2003)How healthy are ACM SIGWEB sponsored conferences?, , и . SIGWEB Newsl., 2017 (Spring): 4:1-4:17 (2017)Pariket: Mining Business Process Logs for Root Cause Analysis of Anomalous Incidents., , и . DNIS, том 8999 из Lecture Notes in Computer Science, стр. 244-263. Springer, (2015)Investigating the Potential of Aggregated Tweets as Surrogate Data for Forecasting Civil Protests., и . CODS, стр. 8:1-8:6. ACM, (2016)