Author of the publication

QP Algorithms with Guaranteed Accuracy and Run Time for Support Vector Machines

, , , and . J. Mach. Learn. Res., (2006)http://www.jmlr.org/papers/volume7/hush06a/hush06a.pdf.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development and validation of an algorithm to recalibrate mental models and reduce diagnostic errors associated with catheter-associated bacteriuria., , , , , , , and . BMC Med. Inf. & Decision Making, (2013)QP Algorithms with Guaranteed Accuracy and Run Time for Support Vector Machines, , , and . J. Mach. Learn. Res., (2006)http://www.jmlr.org/papers/volume7/hush06a/hush06a.pdf.ARC: A Specification Language for Communicating Systems.. Comput. J., 41 (6): 386-401 (1998)Bivariate Transfer Functions on Unstructured Grids., , , , and . Comput. Graph. Forum, 28 (3): 783-790 (2009)Dynamic routing in open queueing networks: Brownian models, cut constraints and resource pooling., and . Queueing Syst., 13 (1-3): 47-86 (1993)How a group reaches agreement: A stochastic model.. Mathematical Social Sciences, 2 (1): 1-8 (1982)The Dependence of Sojourn Times in Closed Queueing Networks.. Computer Performance and Reliability, page 111-121. North-Holland, (1983)Evaluation and Integration of COTS in Evidence based Assurance Frameworks., , and . SSS, page 233-254. Springer, (2010)Visualizing Turbulent Flow., , and . IEEE Visualization, page 22. IEEE Computer Society, (2004)Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection., , , and . Annals OR, 183 (1): 47-73 (2011)