Author of the publication

Ensemble of SVMs for Incremental Learning.

, , , and . Multiple Classifier Systems, volume 3541 of Lecture Notes in Computer Science, page 246-256. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Erdem, Zeki
add a person with the name Erdem, Zeki
 

Other publications of authors with the same name

A real time data warehouse approach for data processing., , , and . SIU, page 1-4. IEEE, (2013)Online Naive Bayes classification for network intrusion detection., , , and . ASONAM, page 670-674. IEEE Computer Society, (2014)Specific Similarity Measure for Terrorist Networks: How Much Similar Are Terrorist Networks of Turkey?, , , and . PAISI, volume 6749 of Lecture Notes in Computer Science, page 15-26. Springer, (2011)Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms., , and . PAISI, volume 5477 of Lecture Notes in Computer Science, page 25-30. Springer, (2009)Detecting criminal networks: SNA models are compared to proprietary models., , , and . ISI, page 156-158. IEEE, (2012)Improved Naïve Bayesian algorithm for author detection., , , and . SIU, page 1-4. IEEE, (2013)Comparing Two Models for Terrorist Group Detection: GDM or OGDM?., , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 149-160. Springer, (2008)Reducing the Effect of Out-Voting Problem in Ensemble Based Incremental Support Vector Machines., , , and . ICANN (2), volume 3697 of Lecture Notes in Computer Science, page 607-612. Springer, (2005)Prediction of past unsolved terrorist attacks., , and . ISI, page 37-42. IEEE, (2009)Incorporating data sources and methodologies for crime data mining., , , and . ISI, page 176-180. IEEE, (2011)