Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sampling High Throughput Data for Anomaly Detection of Data-Base Activity., , , , , and . CoRR, (2017)Using Bandits for Effective Database Activity Monitoring., , , , and . PAKDD (2), volume 12085 of Lecture Notes in Computer Science, page 701-713. Springer, (2020)CyberRank: Knowledge Elicitation for Risk Assessment of Database Security., , , , and . CIKM, page 2009-2012. ACM, (2016)Temporal Anomaly Detection: Calibrating the Surprise., , , , and . AAAI, page 3755-3762. AAAI Press, (2019)Case Study in Hebrew Character Searching., , , , and . ICDAR, page 1080-1084. IEEE Computer Society, (2011)WebGT: An Interactive Web-Based System for Historical Document Ground Truth Generation., , , and . ICDAR, page 305-308. IEEE Computer Society, (2013)Text Line Detection in Corrupted and Damaged Historical Manuscripts., , , , and . ICDAR, page 812-816. IEEE Computer Society, (2013)The influence of language orthographic characteristics on digital word recognition., , and . Digit. Scholarsh. Humanit., 30 (4): 495-502 (2015)Temporal anomaly detection: calibrating the surprise., , , , and . CoRR, (2017)Diversifying Database Activity Monitoring with Bandits., , , , and . CoRR, (2019)