Author of the publication

Learning Terrorist Profiles by Optimization with Two Objectives.

, , , , and . IKE, page 364-369. CSREA Press, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local Soft Belief Updating for Relational Classification., , , , and . ISMIS, volume 4994 of Lecture Notes in Computer Science, page 525-534. Springer, (2008)Empirical Comparison of Greedy Strategies for Learning Markov Networks of Treewidth k., , , , , and . ICMLA, page 106-111. IEEE Computer Society, (2008)Approximating Pseudo-Boolean Functions on Non-Uniform Domains., , , and . IJCAI, page 1754-1755. Professional Book Center, (2005)Generic interpolation polynomial for list decoding.. Finite Fields Their Appl., 18 (1): 167-178 (2012)Asymptotic Behavior of Linear Approximations of Pseudo-Boolean Functions., , , and . JACIII, 11 (4): 403-409 (2007)Graph-theoretic method for merging security system specifications., , , and . Inf. Sci., 177 (10): 2152-2166 (2007)Comparison of Greedy Strategies for Learning Markov Networks of Treewidth k., , , , and . MLMTA, page 294-. CSREA Press, (2007)Formulas for approximating pseudo-Boolean random variables., , , and . Discrete Applied Mathematics, 156 (10): 1581-1597 (2008)Transforms of pseudo-Boolean random variables., , , , and . Discrete Applied Mathematics, 158 (1): 13-24 (2010)New bounds for randomized busing., , , , and . Theor. Comput. Sci., 332 (1-3): 63-81 (2005)