Author of the publication

Early Assessment of Classification Performance.

, , , , and . ACSW, volume 32 of CRPIT, page 91-96. Australian Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WSDL and UDDI extensions for version support in web services., , , and . J. Syst. Softw., 82 (8): 1326-1343 (2009)Assessment of Classification Models with Small Amounts of Data., , , , , and . Informatica, 18 (3): 343-362 (2007)Comparisons between Three Cross-Validation Methods for Measuring Learners' Performances., , and . EJC, volume 272 of Frontiers in Artificial Intelligence and Applications, page 77-87. IOS Press, (2014)Data protection for outsourced data mining., , , , , and . Informatica (Slovenia), (2002)Rejecting the death of passwords: Advice for the future., and . Comput. Sci. Inf. Syst., 16 (1): 313-332 (2019)Responsible Artificial Intelligence: A Structured Literature Review., , and . CoRR, (2024)Overview of Machine Learning Process Modelling., , and . Entropy, 23 (9): 1123 (2021)Two proposed identity-based three-party authenticated key agreement protocols from pairings., , and . Comput. Secur., 29 (2): 244-252 (2010)User Experience of Croatian National & Nature Parks' Website - A Comparison., , and . HCI (43), volume 1832 of Communications in Computer and Information Science, page 561-570. Springer, (2023)Permissions vs. Privacy Policies of Apps in Google Play Store and Apple App Store., , and . EJC, volume 364 of Frontiers in Artificial Intelligence and Applications, page 258-275. IOS Press, (2022)