From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems., , и . CRiSIS, том 10694 из Lecture Notes in Computer Science, стр. 18-28. Springer, (2017)Data Mining for Biodiversity Prediction in Forests., , , , и . ECAI, том 215 из Frontiers in Artificial Intelligence and Applications, стр. 289-294. IOS Press, (2010)Building Reactive Characters for Dynamic Gaming Environments., и . CIG, IEEE, (2005)A Comparison between Two Optimisation Alternatives for Mapping in Wireless Network on Chip., , , , и . ICTAI, стр. 938-945. IEEE Computer Society, (2016)Extrapolating from Limited Uncertain Information in Large-Scale Combinatorial Optimization Problems to Obtain Robust Solutions., , , и . Int. J. Artif. Intell. Tools, 25 (1): 1660005:1-1660005:21 (2016)A scalable approach for computing distance-bounded node-disjoint paths in optical networks., , , , и . ICTON, стр. 1-4. IEEE, (2015)Privacy Interpretation of Behaviour-based Anomaly Detection Approaches., , и . SIN, стр. 1-7. IEEE, (2021)Weibull-Based Benchmarks for Bin Packing., , и . CP, том 7514 из Lecture Notes in Computer Science, стр. 207-222. Springer, (2012)Relaxations and Explanations for Quantified Constraint Satisfaction Problems., и . CP, том 4204 из Lecture Notes in Computer Science, стр. 690-694. Springer, (2006)Computation and Complexity of Preference Inference Based on Hierarchical Models., , и . IJCAI, стр. 3271-3277. AAAI Press, (2015)