Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Bayesian interpretation of fact-finding in information networks., , , , , , , , , and . FUSION, page 1-8. IEEE, (2011)Controlled generation of hard and easy Bayesian networks: Impact on maximal clique size in tree clustering., , and . Artif. Intell., 170 (16-17): 1137-1174 (2006)Making Sense of Unstructured Textual Data.. Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web, volume 27 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2010)Portfolios in Stochastic Local Search: Efficiently Computing Most Probable Explanations in Bayesian Networks., , and . J. Autom. Reasoning, 46 (2): 103-160 (2011)Reasoning with Models., and . AAAI, page 1148-1153. AAAI Press / The MIT Press, (1994)0-262-61102-3.Linear Concepts and Hidden Variables: An Empirical Study., and . NIPS, page 500-506. The MIT Press, (1997)A Large Deviation Bound for the Area Under the ROC Curve., , , and . NIPS, page 9-16. (2004)Learning Active Classifiers., , and . ICML, page 207-215. Morgan Kaufmann, (1996)Learning Components for A Question-Answering System., , , , , , , , and . TREC, Special Publication 500-250, National Institute of Standards and Technology (NIST), (2001)Semantic Integration in Text: From Ambiguous Names to Identifiable Entities., , and . AI Magazine, 26 (1): 45-58 (2005)