Author of the publication

Sets of Contrasting Rules to Identify Trigger Factors.

, , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 1728-1729. IOS Press, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Match-Fixing in Football Matches Using a Conformal Anomaly Detector., and . IT&I, volume 3624 of CEUR Workshop Proceedings, page 205-219. CEUR-WS.org, (2023)Microfiles as a Potential Source of Confidential Information Leakage., and . Intelligent Methods for Cyber Warfare, volume 563 of Studies in Computational Intelligence, Springer, (2015)Method for Identifying Twitter Accounts that Have Changed their Opinion about Politicians., and . ITS, volume 2859 of CEUR Workshop Proceedings, page 24-35. CEUR-WS.org, (2020)Providing Group Anonymity Using Wavelet Transform., and . BNCOD, volume 6121 of Lecture Notes in Computer Science, page 25-36. Springer, (2010)Determining Reasons of Political Rating Changes Based on Twitter Data., and . ITS, volume 3241 of CEUR Workshop Proceedings, page 36-45. CEUR-WS.org, (2021)SSA-Caterpillar in Group Anonymity, and . CoRR, (2011)Group Anonymity., and . IPMU (2), volume 81 of Communications in Computer and Information Science, page 592-601. Springer, (2010)Search of the Deviation from the Natural Process Using Stepanets Approach for Classification of Functions., , and . IDAACS, page 720-724. IEEE, (2021)SCR-Apriori for Mining 'Sets of Contrasting Rules'., and . CoRR, (2019)Two-Phase Memetic Modifying Transformation for Solving the Task of Providing Group Anonymity., and . WCSC, volume 342 of Studies in Fuzziness and Soft Computing, page 239-253. Springer, (2014)