Author of the publication

Crime Hotspots: An Evaluation of the KDE Spatial Mapping Technique.

, , and . EISIC, page 69-74. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Corporate Support by Predicting Customer e-Mail Response Time: Experimental Evaluation and a Practical Use Case., , and . ICEIS (Revised Selected Papers), volume 417 of Lecture Notes in Business Information Processing, page 100-121. Springer, (2020)Predicting User Participation in Social Media., , , and . NetSci-X, volume 9564 of Lecture Notes in Computer Science, page 126-135. Springer, (2016)Comparison of Clustering Approaches for Gene Expression Data., , and . SCAI, volume 257 of Frontiers in Artificial Intelligence and Applications, page 55-64. IOS Press, (2013)Seed Selection for Information Cascade in Multilayer Networks., , and . COMPLEX NETWORKS, volume 689 of Studies in Computational Intelligence, page 426-436. Springer, (2017)Multi-expert estimations of burglars' risk exposure and level of pre-crime preparation based on crime scene data., , and . SAIS, volume 137 of Linköping Electronic Conference Proceedings, page 137:004. Linköping University Electronic Press, (2017)Improving anomaly detection in SCADA network communication with attribute extension., , and . Energy Inform., (2022)A Comparison of Unsupervised Learning Algorithms for Intrusion Detection in IEC 104 SCADA Protocol., , and . ICMLC, page 1-8. IEEE, (2021)Informed Software Installation Through License Agreement Categorization., , and . ISSA, ISSA, Pretoria, South Africa, (2011)Detecting serial residential burglaries using clustering., , , , and . Expert Syst. Appl., 41 (11): 5252-5266 (2014)Recent Developments in Low-Power AI Accelerators: A Survey., , and . Algorithms, 15 (11): 419 (2022)