Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategies and Best Practices for Data Literacy Education: Knowledge Synthesis Report, , , , , , , , and . (2015)Improving the Interpretability of Deep Neural Networks with Knowledge Distillation., , and . ICDM Workshops, page 905-912. IEEE, (2018)Improving point-based AIS trajectory classification with partition-wise gated recurrent units., , , , , and . IJCNN, page 4044-4051. IEEE, (2017)Using Qualitative Models to Guide Inductive Learning., and . ICML, page 49-56. Morgan Kaufmann, (1993)How to Prevent Private Data from being Disclosed to a Malicious Attacker., , and . Data Mining: Foundations and Practice, volume 118 of Studies in Computational Intelligence, Springer, (2008)A Logic-Based Knowledge Source System for Natural Language Document., , , , and . Data Knowl. Eng., 1 (3): 201-231 (1985)Advantages of a non-technical XACML notation in role-based models., , and . PST, page 193-200. IEEE, (2011)ANALYTiC: An Active Learning System for Trajectory Classification., , and . IEEE Computer Graphics and Applications, 37 (5): 28-39 (2017)Filtering Multi-Instance Problems to Reduce Dimensionality in Relational Learning., and . J. Intell. Inf. Syst., 22 (1): 23-40 (2004)Privacy-Oriented Data Mining by Proof Checking., and . PKDD, volume 2431 of Lecture Notes in Computer Science, page 138-149. Springer, (2002)