Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporally Coherent Role-Topic Models (TCRTM): Deinterlacing Overlapping Activity Patterns., , and . ECML/PKDD (2), volume 9285 of Lecture Notes in Computer Science, page 390-405. Springer, (2015)Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data., , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 6 (4): 47-63 (2015)Bringing Galileo Into LBS Market - the Agile Project., , , and . PIMRC, page 1-5. IEEE, (2006)IMILAST: A Community Effort to Intercompare Extratropical Cyclone Detection and Tracking Algorithms, , , , , , , , , and 26 other author(s). Bull. Amer. Meteor. Soc., 94 (4): 529--547 (Sep 19, 2012)Detecting Insider Threat from Enterprise Social and Online Activity Data., , , , , and . MIST@CCS, page 13-20. ACM, (2015)Towards Accurate Simulation of Global Challenges on Data Centers Infrastructures via Coupling of Models and Data Sources., , , , , , , , , and 2 other author(s). ICCS (6), volume 12142 of Lecture Notes in Computer Science, page 410-424. Springer, (2020)Evolving Probabilistically Significant Epistatic Classification Rules for Heterogeneous Big Datasets., , , and . GECCO, page 445-452. ACM, (2016)A Tandem Evolutionary Algorithm for Identifying Causal Rules from Complex Data., , , and . Evol. Comput., 28 (1): 87-114 (2020)