Author of the publication

Using relational knowledge discovery to prevent securities fraud

, , , , , and . Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mild cognitive impairment – beyond controversies, towards a consensus: report of the International Working Group on Mild Cognitive Impairment, , , , , , , , , and 15 other author(s). Journal of Internal Medicine, 256 (3): 240--246 (2004)Using relational knowledge discovery to prevent securities fraud, , , , , and . Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, (2005)Support line and tube visibility in chest examinations using computed radiography., , , and . J. Digital Imaging, 10 (3): 126-131 (1997)Automated visual inspection of aircraft engine combustor assemblies., , , and . ICRA, page 1919-1924. IEEE, (1986)Ä digital adaptive noise-canceller based on a stabilized version of the widrow L.M.S. algorithm"., , and . ICASSP, page 1394-1397. IEEE, (1982)Learning Deep Models from Synthetic Data for Extracting Dolphin Whistle Contours., , , , , , , , , and 1 other author(s). IJCNN, page 1-10. IEEE, (2020)Picture archiving and communication system bandwidth and storage requirements., , , , and . J. Digital Imaging, 9 (2): 60-66 (1996)Toward an integrated project complexity narrative - A case study of academic organizations., , , , and . Syst. Eng., 25 (5): 443-456 (2022)Evaluating parallel processors for real-time applications., , , , , , and . Parallel Comput., 8 (1-3): 245-254 (1988)Dynamic voice source changes in natural and synthetic speech., and . ICSLP, page 129-132. ISCA, (1992)