Author of the publication

Preliminary Results on the use of Artificial Intelligence for Managing Customer Life Cycles.

, , , and . SAIS, volume 199 of Linköping Electronic Conference Proceedings, page 68-76. Linköping University Electronic Press, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies., and . Int. J. Inf. Secur. Priv., 13 (2): 47-66 (2019)E-mail classification with machine learning and word embeddings for improved customer support., , , and . Neural Comput. Appl., 33 (6): 1881-1902 (2021)Alarm Prediction in Cellular Base Stations Using Data-Driven Methods., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1925-1933 (2021)Predicting e-Mail Response Time in Corporate Customer Support., , and . ICEIS (1), page 305-314. SCITEPRESS, (2020)Using Conformal Prediction for Multi-label Document Classification in e-Mail Support Systems., , and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 308-322. Springer, (2019)Analysing Countermeasures Against Privacy-Invasive Software., and . ICSEA, page 61. IEEE Computer Society, (2006)Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data., and . EISIC, page 92-95. IEEE Computer Society, (2016)Crawling Online Social Networks., , , , and . ENIC, page 9-16. IEEE Computer Society, (2015)Multi-expert estimations of burglars' risk exposure and level of pre-crime preparation based on crime scene data., , and . SAIS, volume 137 of Linköping Electronic Conference Proceedings, page 137:004. Linköping University Electronic Press, (2017)Preventing Privacy-Invasive Software Using Collaborative Reputation Systems., , , and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 142-157. Springer, (2007)