Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Wikipedia to Boost SVD Recommender Systems, , , and . CoRR, (2012)Content-based data leakage detection using extended fingerprinting, , and . CoRR, (2013)RecSys Challenge 2015 and the YOOCHOOSE Dataset., , , , , and . RecSys, page 357-358. ACM, (2015)Online Budgeted Learning for Classifier Induction., , , and . CoRR, (2019)Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories., , , and . RecSys Posters, volume 1688 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , and . GCAI, volume 55 of EPiC Series in Computing, page 215-228. EasyChair, (2018)Using the Information Structure Model to Compare Profile-Based Information Filtering Systems., , and . Inf. Retr., 6 (1): 75-97 (2003)Evaluation of the real and perceived value of automatic and interactive query expansion, , and . SIGIR '04: Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, page 526--527. New York, NY, USA, ACM, (2004)Transfer Learning for Time Series Classification Using Synthetic Data Generation., , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 232-246. Springer, (2022)Predict Demographic Information Using Word2vec on Spatial Trajectories., , , , and . UMAP, page 331-339. ACM, (2018)