Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How healthy are ACM SIGWEB sponsored conferences?, , and . SIGWEB Newsl., 2017 (Spring): 4:1-4:17 (2017)A Nine Year Story of the India Software Engineering Conference from 2008 to 2016., and . ACM SIGSOFT Softw. Eng. Notes, 41 (5): 31-44 (2016)Using tabu best-response search to find pure strategy nash equilibria in normal form games., and . AAMAS, page 1023-1029. ACM, (2005)Investigating the Role of Twitter in E-Governance by Extracting Information on Citizen Complaints and Grievances Reports., and . BDA, volume 10721 of Lecture Notes in Computer Science, page 300-310. Springer, (2017)Mining tweets for tag recommendation on social media., and . SMUC, page 69-76. ACM, (2011)Pariket: Mining Business Process Logs for Root Cause Analysis of Anomalous Incidents., , and . DNIS, volume 8999 of Lecture Notes in Computer Science, page 244-263. Springer, (2015)Investigating the Potential of Aggregated Tweets as Surrogate Data for Forecasting Civil Protests., and . CODS, page 8:1-8:6. ACM, (2016)A Topical Crawler for Uncovering Hidden Communities of Extremist Micro-Bloggers on Tumblr., and . #MSM, volume 1395 of CEUR Workshop Proceedings, page 26-27. CEUR-WS.org, (2015)Table Extraction from PDF Files using combination of Heuristics and Machine Learning Techniques., , , and . IICAI, page 2170-2182. IICAI, (2009)An algorithm for computing the outcome of combinatorial auctions with proxy bidding., , , and . ICEC, volume 50 of ACM International Conference Proceeding Series, page 1-8. ACM, (2003)