Author of the publication

Observing a Naïve Bayes Classifier's Performance on Multiple Datasets.

, , and . ADBIS, volume 8716 of Lecture Notes in Computer Science, page 263-275. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparisons between Three Cross-Validation Methods for Measuring Learners' Performances., , and . EJC, volume 272 of Frontiers in Artificial Intelligence and Applications, page 77-87. IOS Press, (2014)WSDL and UDDI extensions for version support in web services., , , and . J. Syst. Softw., 82 (8): 1326-1343 (2009)Responsible Artificial Intelligence: A Structured Literature Review., , and . CoRR, (2024)User Experience of Croatian National & Nature Parks' Website - A Comparison., , and . HCI (43), volume 1832 of Communications in Computer and Information Science, page 561-570. Springer, (2023)Permissions vs. Privacy Policies of Apps in Google Play Store and Apple App Store., , and . EJC, volume 364 of Frontiers in Artificial Intelligence and Applications, page 258-275. IOS Press, (2022)Predicting Sample Size in Data Mining Tasks: Using Additive Incremental Approach., , and . EJC, volume 67 of Frontiers in Artificial Intelligence and Applications, page 264-270. IOS Press, (2000)Observing a Naïve Bayes Classifier's Performance on Multiple Datasets., , and . ADBIS, volume 8716 of Lecture Notes in Computer Science, page 263-275. Springer, (2014)Opening the Knowledge Tombs - Web Based Text Mining as Approach for Re-evaluation of Machine Learning Rules., , and . ADBIS, volume 6295 of Lecture Notes in Computer Science, page 533-542. Springer, (2010)Performance analysis of two open source intrusion detection systems., and . MIPRO, page 1387-1392. IEEE, (2016)Learning Process Termination Criteria., , , , , , and . Informatica, 23 (4): 521-536 (2012)