Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Query Expansion Using External Evidence., , and . ECIR, volume 5478 of Lecture Notes in Computer Science, page 362-374. Springer, (2009)LINKREC: a unified framework for link recommendation with user attributes and graph structure., , , and . WWW, page 1211-1212. ACM, (2010)Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems., , , , and . WCC, volume 3969 of Lecture Notes in Computer Science, page 242-251. Springer, (2005)The Power of the Patient Voice: Learning Indicators of Treatment Adherence From An Online Breast Cancer Forum., , , , and . ICWSM, page 337-346. AAAI Press, (2017)Survey on social tagging techniques., , , and . SIGKDD Explor., 12 (1): 58-72 (2010)Cryptanalysis of the new TTS scheme in CHES 2004., , and . Int. J. Inf. Sec., 5 (4): 231-240 (2006)BlueFinder: estimate where a beach photo was taken., , , , , and . WWW (Companion Volume), page 469-470. ACM, (2012)Mining Twitter as a First Step toward Assessing the Adequacy of Gender Identification Terms on Intake Forms., , , , , , , , , and . AMIA, AMIA, (2015)GAD: General Activity Detection for Fast Clustering on Large Data., , , , and . SDM, page 2-13. SIAM, (2009)Geographical topic discovery and comparison., , , , and . WWW, page 247-256. ACM, (2011)