Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A case for automated large-scale semantic annotation., , , , , , , , , and 2 other author(s). J. Web Semant., 1 (1): 115-132 (2003)Trawling the Web for Emerging Cyber-Communities., , , and . Comput. Networks, 31 (11-16): 1481-1493 (1999)Template detection via data mining and its applications., and . WWW, page 580-591. ACM, (2002)Core algorithms in the CLEVER system., , , and . ACM Trans. Internet Techn., 6 (2): 131-152 (2006)The Web as a Graph: Measurements, Models, and Methods., , , , and . COCOON, volume 1627 of Lecture Notes in Computer Science, page 1-17. Springer, (1999)The Web as a Graph., , , , , and . PODS, page 1-10. ACM, (2000)Primal-dual RNC approximation algorithms for (multi)-set (multi)-cover and covering integer programs, and . FOCS, page 322-331. IEEE Computer Society, (1993)Self-similarity in the Web., , , , , and . VLDB, page 69-78. Morgan Kaufmann, (2001)Random graph models for the web graph., , , , , and . FOCS, page 57-65. IEEE Computer Society, (2000)Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud Detection., , , , , , , , and . TrustCom/BigDataSE, page 1070-1078. IEEE, (2018)