Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

POMDP Filter: Pruning POMDP Value Functions with the Kaczmarz Iterative Method., , , and . MICAI (1), volume 6437 of Lecture Notes in Computer Science, page 254-265. Springer, (2010)Artificial intelligence in computer security: Detection, temporary repair and defense.. Texas Tech University, Lubbock, USA, (2012)base-search.net (fttexastechuniv:oai:ttu-ir.tdl.org:2346/45196).Winds of change: toward systemic improvement of a computer science program., , , and . SIGITE Conference, page 201-206. ACM, (2013)Using Convolutional Neural Network to Predict EURO Games.. CCWC, page 285-290. IEEE, (2024)Q-Learning: From Computer Network Security to Software Security., and . ICMLA, page 257-262. IEEE, (2014)A theoretical Q-learning temporary security repair., and . CICS, page 74-80. IEEE, (2014)First Steps Towards Predicting the Readability of Programming Error Messages., , , , , , and . SIGCSE (1), page 549-555. ACM, (2023)Using Local Regression in Monte Carlo Tree Search., and . ICMLA (1), page 500-503. IEEE, (2012)An Artificial Immune System Based on Holland's Classifier as Network Intrusion Detection., and . ICMLA (1), page 504-507. IEEE, (2012)Using Genetic Algorithm to Create an Ensemble Machine Learning Models to Predict Tennis., and . FTC (1), volume 559 of Lecture Notes in Networks and Systems, page 681-695. Springer, (2022)