Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Situation Recognition: Representation and Algorithms., , and . IJCAI, page 166-174. Morgan Kaufmann, (1993)Chronicle Recognition Improvement Using Temporal Focusing and Hierarchization., and . IJCAI, page 324-329. (2007)Extending and Unifying Chronicle Representation with Event Counters.. ECAI, page 257-261. IOS Press, (2002)Chronicle Recognition for Mobility Management Triggers., , , and . ISCC, page 305-310. IEEE Computer Society, (2007)Contrôle des observations pour la gestion des systèmes de flux de données., and . EGC, volume RNTI-E-15 of Revue des Nouvelles Technologies de l'Information, page 449-450. Cépaduès-Éditions, (2009)Monitoring and Alarm Interpretation in Industrial Environments., , , , , , , , and . AI Commun., 11 (3-4): 139-173 (1998)Controlling the Event Streams to Become More Autonomous., and . ICAS, page 100-105. IEEE Computer Society, (2009)Towards an Autonomic Network Architecture for Self-healing in Telecommunications Networks., , , and . AIMS, volume 6155 of Lecture Notes in Computer Science, page 110-113. Springer, (2010)Discovering Chronicles with Numerical Time Constraints from Alarm Logs for Monitoring Dynamic Systems., and . IJCAI, page 620-626. Morgan Kaufmann, (1999)Mining of an Alarm Log to Improve the Discovery of Frequent Patterns., , and . ICDM, volume 3275 of Lecture Notes in Computer Science, page 144-152. Springer, (2004)