Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pruning Adaptive Boosting., and . ICML, page 211-218. Morgan Kaufmann, (1997)Learning and Generalization of Characteristic Descriptions: Evaluation Criteria and Comparative Review of Selected Methods., and . IJCAI, page 223-231. William Kaufmann, (1979)Real-Time Detection of Task Switches of Desktop Users., , and . IJCAI, page 2868-2873. (2007)Machine Learning Methods for High Level Cyber Situation Awareness., , , and . Cyber Situational Awareness, volume 46 of Advances in Information Security, Springer, (2010)Factoring Exogenous State for Model-Free Monte Carlo., , , , and . CoRR, (2017)Rise of concerns about AI: reflections and directions., and . Commun. ACM, 58 (10): 38-40 (2015)Solving the Multiple Instance Problem with Axis-Parallel Rectangles., , and . Artif. Intell., 89 (1-2): 31-71 (1997)A hybrid learning system for recognizing user tasks from desktop activities and email messages., , , and . IUI, page 86-92. ACM, (2006)Open Category Detection with PAC Guarantees, , , , and . (2018)cite arxiv:1808.00529.Discovering and Removing Exogenous State Variables and Rewards for Reinforcement Learning., , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 1261-1269. PMLR, (2018)