Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Activity-based temporal anomaly detection in enterprise-cyber security., , and . ISI, page 248-250. IEEE, (2016)Deciding what to observe next: adaptive variable selection for regression in multivariate data streams., , and . SAC, page 961-965. ACM, (2008)A Simulation Study of Indirect Prognostic Classification., , and . COMPSTAT, page 149-154. Springer, (1998)Fusing multimodal microscopy data for improved cell boundary estimation and fluorophore localization of Pseudomonas aeruginosa., , and . ACSSC, page 1177-1181. IEEE, (2018)Adaptive Anomaly Detection on Network Data Streams., , and . ISI, page 19-24. IEEE, (2018)Intelligent Data Analysis in the 21st Century., and . IDA, volume 5772 of Lecture Notes in Computer Science, page 1-9. Springer, (2009)The Design, Deployment and Evaluation of the AnimalWatch Intelligent Tutoring System., , and . ECAI, volume 178 of Frontiers in Artificial Intelligence and Applications, page 663-667. IOS Press, (2008)Robot Baby 2001., , , and . ALT, volume 2225 of Lecture Notes in Computer Science, page 32-56. Springer, (2001)lambda-Perceptron: An adaptive classifier for data streams., , , and . Pattern Recognit., 44 (1): 78-96 (2011)On Averaging ROC Curves., and . Trans. Mach. Learn. Res., (2023)