Author of the publication

Spyware Prevention by Classifying End User License Agreements.

, , , and . New Challenges in Applied Intelligence Technologies, volume 134 of Studies in Computational Intelligence, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved concept drift handling in surgery prediction and other applications., , , and . Knowl. Inf. Syst., 44 (1): 177-196 (2015)Consensus Decision Making in Random Forests., , , and . MOD, volume 9432 of Lecture Notes in Computer Science, page 347-358. Springer, (2015)Learning Machine Learning: A Case Study.. IEEE Trans. Educ., 53 (4): 672-676 (2010)Multi-View Data Analysis Techniques for Monitoring Smart Building Systems., , , , and . Sensors, 21 (20): 6775 (2021)Identification of Energy Hotspots: A Case Study of the Very Fast Decision Tree., , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 267-281. (2017)CudaRF: A CUDA-based implementation of Random Forests., , , and . AICCSA, page 95-101. IEEE Computer Society, (2011)Identification of Surgery Indicators by Mining Hospital Data: A Preliminary Study., and . DEXA Workshops, page 323-327. IEEE Computer Society, (2009)Large-scale information retrieval in software engineering - an experience report from industrial application., , , and . Empirical Software Engineering, 21 (6): 2324-2365 (2016)DIGITNET: A Deep Handwritten Digit Detection and Recognition Method Using a New Historical Handwritten Digit Dataset., , , and . Big Data Res., (2021)Detecting ditches using supervised learning on high-resolution digital elevation models., , , , and . Expert Syst. Appl., (2022)