Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Web Users on the Base of their Browsing Patterns.. Int. J. Comput. Intell. Syst., 4 (5): 1062-1069 (2011)Bounds for Validation.. Fundam. Informaticae, 70 (3): 261-275 (2006)Learning Compound Decision Functions for Sequential Data in Dialog with Experts.. RSCTC, volume 4259 of Lecture Notes in Computer Science, page 627-636. Springer, (2006)Recognition of Internet Portal Users on the Basis of Their Behaviour.. RSKT, volume 6401 of Lecture Notes in Computer Science, page 520-527. Springer, (2010)Model Selection and Assessment for Classification Using Validation.. RSFDGrC (1), volume 3641 of Lecture Notes in Computer Science, page 481-490. Springer, (2005)A Note on the Regularization Algorithm.. Rough Sets and Current Trends in Computing, volume 3066 of Lecture Notes in Computer Science, page 235-243. Springer, (2004)ENIAM: Categorial Syntactic-Semantic Parser for Polish., and . COLING (Demos), page 243-247. ACL, (2016)Credibility as Signal: Predicting Evaluations of Credibility by a Signal-Based Model., , , and . WI, page 113-120. IEEE Computer Society, (2016)Syntactic Approximation of Semantic Roles., and . PolTAL, volume 8686 of Lecture Notes in Computer Science, page 193-201. Springer, (2014)Application of linguistic cues in the analysis of language of hate groups., and . Comput. Sci., 16 (2): 145-156 (2015)