Machine Learning - Special issue on inductive transfer
Learning Coordination Strategies for Cooperative Multiagent Systems
Machine Learning
A sequential sampling algorithm for a general class of utility criteria
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
ACM Computing Surveys (CSUR)
A Scalable Constant-Memory Sampling Algorithm for Pattern Discovery in Large Databases
PKDD '02 Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery
How Can Computer Science Contribute to Knowledge Discovery?
SOFSEM '01 Proceedings of the 28th Conference on Current Trends in Theory and Practice of Informatics Piestany: Theory and Practice of Informatics
Sequential Sampling Techniques for Algorithmic Learning Theory
ALT '00 Proceedings of the 11th International Conference on Algorithmic Learning Theory
Mining complex models from arbitrarily large databases in constant time
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Reinforcement learning for POMDPs based on action values and stochastic optimization
Eighteenth national conference on Artificial intelligence
Finding the most interesting patterns in a database quickly by using sequential sampling
The Journal of Machine Learning Research
Least-squares fit of genomic data by sums of epistatic effects
Journal of Parallel and Distributed Computing - High-performance computational biology
Fast discovery of unexpected patterns in data, relative to a Bayesian network
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Sequential sampling techniques for algorithmic learning theory
Theoretical Computer Science - Algorithmic learning theory (ALT 2000)
Learning Bayesian nets that perform well
UAI'97 Proceedings of the Thirteenth conference on Uncertainty in artificial intelligence
Object focused q-learning for autonomous agents
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Obtaining the threat model for e-mail phishing
Applied Soft Computing
Hi-index | 0.00 |