Author of the publication

Using Support Vector Machines for Terrorism Information Extraction.

, , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 1-12. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering knowledge from medical databases using evolutionory algorithms, , , , and . IEEE Engineering in Medicine and Biology Magazine, 19 (4): 45--55 (July 2000)Collaborative Information Extraction and Mining from Multiple Web Documents., , and . SDM, page 442-452. SIAM, (2006)A Distributed Learning Algorithm for Bayesian Inference Networks., and . IEEE Trans. Knowl. Data Eng., 14 (1): 93-105 (2002)Learning to Adapt Web Information Extraction Knowledge and Discovering New Attributes via a Bayesian Approach., and . IEEE Trans. Knowl. Data Eng., 22 (4): 523-536 (2010)Exploiting interactions of review text, hidden user communities and item groups, and time for collaborative filtering., , , and . Knowl. Inf. Syst., 52 (1): 221-254 (2017)Detection of Shifts in User Interests for Personalized Information Filtering., , , and . SIGIR, page 317-325. ACM, (1996)Adapting Web information extraction knowledge via mining site-invariant and site-dependent features., and . ACM Trans. Internet Techn., 7 (1): 6 (2007)Product Question Intent Detection using Indicative Clause Attention and Adversarial Learning., and . ICTIR, page 75-82. ACM, (2018)Entity Retrieval in the Knowledge Graph with Hierarchical Entity Type and Content., , and . ICTIR, page 211-214. ACM, (2018)An unsupervised ranking method based on a technical difficulty terrain., , , and . CIKM, page 1989-1992. ACM, (2011)