Author of the publication

Clinical narrative classification using discriminant word embeddings with ELM.

, , , and . IJCNN, page 2931-2938. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects Analysis of Archetecture Changes to Convolutional Neural Networks., and . SKG, page 98-105. IEEE, (2017)Empirical Analysis of Local Round Trip Time for Wireless Traffic Differentiation., and . QSHINE, volume 74 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-237. Springer, (2010)Bucket Learning: Improving Model Quality through Enhancing Local Patterns., and . ICDM Workshops, page 539-544. IEEE Computer Society, (2009)Anomaly-Based Behavior Analysis of Wireless Network Security., , , and . MobiQuitous, page 1-8. IEEE Computer Society, (2007)Multi-label classification with Bayes' theorem., , and . BMEI, page 2281-2285. IEEE, (2011)Distributed Differentially Private Matrix Factorization Based on ADMM., , , , , and . HPCC/SmartCity/DSS, page 2502-2507. IEEE, (2019)Accelerating Homomorphic Full Adder Based on FHEW Using Multicore CPU and GPUs., , , , , and . HPCC/SmartCity/DSS, page 2508-2513. IEEE, (2019)A Lightweight and Fast Approach for Upper Limb Range of Motion Assessment., , , and . ICMLA, page 53-60. IEEE, (2022)A Temporal Dependency Aware Approach for Scheduling Real-Time Tasks on Multi-Core Platforms., , , and . HPCC/SmartCity/DSS, page 2027-2032. IEEE, (2019)Vulnerability Analysis of Faults/Attacks in Network Centric Systems., , , , and . PDCS, page 256-261. ISCA, (2003)