Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Suspicious Timber Trades., , , , , , , , , and . AAAI, page 13248-13254. AAAI Press, (2020)Determining Relative Airport Threats from News and Social Media., , , , , , , and . AAAI, page 4701-4707. AAAI Press, (2017)Inferring Multi-Dimensional Ideal Points for US Supreme Court Justices., , , and . AAAI, page 4-12. AAAI Press, (2016)The role of interactive biclusters in sensemaking., , , and . CHI, page 1559-1562. ACM, (2014)Discovering evolving political vocabulary in social media., , , , , , and . BESC, page 26-32. IEEE, (2014)When do Crowds Turn Violent? Uncovering Triggers from Media., , , , and . ASONAM, page 77-82. IEEE Computer Society, (2018)Multi-Task Learning for Transit Service Disruption Detection., , , , and . ASONAM, page 634-641. IEEE Computer Society, (2018)DyAt Nets: Dynamic Attention Networks for State Forecasting in Cyber-Physical Systems., , and . IJCAI, page 3180-3186. ijcai.org, (2019)SimNest: Social Media Nested Epidemic Simulation via Online Semi-Supervised Deep Learning., , , , , and . ICDM, page 639-648. IEEE Computer Society, (2015)Enhancing usability in CITIDEL: multimodal, multilingual, and interactive visualization interfaces., , , , , , , and . JCDL, page 315-324. ACM, (2004)