Author of the publication

tlrmvnmvt: Computing High-Dimensional Multivariate Normal and Student- t Probabilities with Low-Rank Methods in R.

, , , and . J. Stat. Softw., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrated Multi-Agent CSCW System for Concurrent Product Development., and . International Journal of Information Technology and Decision Making, 1 (3): 423-440 (2002)Bivariate generating functions for Rogers-Szegö polynomials.. Applied Mathematics and Computation, 217 (5): 2209-2216 (2010)Behavioral anomaly detection approach based on log monitoring., and . BESC, page 188-194. IEEE, (2015)Efficient Object Recognition Using Corner Features., , , and . CIS (1), page 344-348. IEEE Computer Society, (2009)Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework., and . Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 249-261. Springer, (2010)Planning Based Service Composition System., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 878-881. Springer, (2004)Bike-Sharing Prediction System., , , , and . Edutainment, volume 9654 of Lecture Notes in Computer Science, page 301-317. Springer, (2016)Diversifying Personalized Recommendation with User-session Context., , , , , and . IJCAI, page 1858-1864. ijcai.org, (2017)Kernel-based reinforcement learning for traffic signal control with adaptive feature selection., , and . CDC, page 1277-1282. IEEE, (2014)Latent Informative Links Detection., , , and . KES, volume 243 of Frontiers in Artificial Intelligence and Applications, page 1233-1242. IOS Press, (2012)