Author of the publication

Efficiently rewriting large multimedia application execution traces with few event sequences.

, , , , , , and . KDD, page 1348-1356. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QuickFill : travailler plus pour générer moins en synthèse de programmes., , , and . EGC, volume E-38 of RNTI, page 461-468. Editions RNTI, (2022)TAG: Learning Timed Automata from Logs., , , and . AAAI, page 3949-3958. AAAI Press, (2022)Shaping Up SHAP: Enhancing Stability through Layer-Wise Neighbor Selection., , , , , , and . AAAI, page 13094-13103. AAAI Press, (2024)Prediction-Based Fleet Relocation for Free Floating Car Sharing Services., , , , , and . ICTAI, page 1187-1191. IEEE, (2021)Netspot: a simple Intrusion Detection System with statistical learning., , , and . TrustCom, page 911-918. IEEE, (2020)DRYADE: A New Approach for Discovering Closed Frequent Trees in Heterogeneous Tree Databases., , and . ICDM, page 543-546. IEEE Computer Society, (2004)Statistically Significant Discriminative Patterns Searching., , , and . DaWaK, volume 11708 of Lecture Notes in Computer Science, page 105-115. Springer, (2019)Anomaly Detection in Streams with Extreme Value Theory., , , and . KDD, page 1067-1075. ACM, (2017)Discovering Useful Compact Sets of Sequential Rules in a Long Sequence., , , , and . ICTAI, page 1295-1299. IEEE, (2021)Topic Signatures in Political Campaign Speeches., , , and . EMNLP, page 2342-2347. Association for Computational Linguistics, (2017)