Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Method for Training Linear SVM in the Primal., and . ECML/PKDD (1), volume 5211 of Lecture Notes in Computer Science, page 272-287. Springer, (2008)From Foursquare to My Square: Learning Check-in Behavior from Multiple Sources., , and . ICWSM, The AAAI Press, (2013)Joint Optimization of Hidden Conditional Random Fields and Non Linear Feature Extraction., , and . ICDAR, page 513-517. IEEE Computer Society, (2011)Regularized bundle methods for convex and non-convex risks., and . J. Mach. Learn. Res., (2012)Inferring social activities with mobile sensor networks., , , , and . ICMI, page 405-412. ACM, (2013)Smartphone usage in the wild: a large-scale analysis of applications and context., , and . ICMI, page 353-360. ACM, (2011)Sélection de modèles par des méthodes à noyaux pour la classification de données séquentielles., , and . EGC, volume RNTI-E-3 of Revue des Nouvelles Technologies de l'Information, page 165-176. Cépaduès-Éditions, (2005)GroupUs: Smartphone Proximity Data and Human Interaction Type Mining., and . ISWC, page 21-28. IEEE Computer Society, (2011)Vlogging Over Time: Longitudinal Impressions and Behavior in YouTube., , , , and . MUM, page 37-46. ACM, (2018)Large margin training for hidden Markov models with partially observed states., and . ICML, volume 382 of ACM International Conference Proceeding Series, page 265-272. ACM, (2009)