Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A weighted sum validity function for clustering with a hybrid niching genetic algorithm., , , and . IEEE Trans. Syst. Man Cybern. Part B, 35 (6): 1156-1167 (2005)What are you Thinking? Explaining Conversation Agent Responses for Criminal Investigations., , , and . ExSS-ATEC@IUI, volume 2582 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)General Euler Diagram Generation., , and . Diagrams, volume 5223 of Lecture Notes in Computer Science, page 13-27. Springer, (2008)The Impact of System Transparency on Analytical Reasoning., , and . CHI Extended Abstracts, page 274:1-274:6. ACM, (2023)3D visualization of gene clusters and networks., , and . Visualization and Data Analysis, volume 5669 of SPIE Proceedings, page 316-326. SPIE, (2005)Solving problems with visual analytics: challenges and applications., and . I-KNOW, page 1. ACM, (2011)Algorithmic Transparency of Conversational Agents., , , , and . IUI Workshops, volume 2327 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Investigating the Security Issues of Multi-layer IoT Attacks Using Machine Learning Techniques., , , and . HCCS, page 1-9. IEEE, (2022)Towards Analytical Provenance Visualization for Criminal Intelligence Analysis., , , , and . CGVC, page 17-24. Eurographics Association, (2016)Node Overlap Removal by Growing a Tree., , , , and . J. Graph Algorithms Appl., 21 (5): 857-872 (2017)