Author of the publication

I2RNTU at SemEval-2016 Task 4: Classifier Fusion for Polarity Classification in Twitter.

, , , , , and . SemEval@NAACL-HLT, page 71-78. The Association for Computer Linguistics, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Roles of Fun and Flow in Social Media Usage - A Comparative Study of American and Chinese Students., , , and . AMCIS, Association for Information Systems, (2013)A Study on Detection and Recovery of Speech Signal Tampering., , , , , and . Trustcom/BigDataSE/ISPA, page 678-682. IEEE, (2016)FPGA implementation of the coupled filtering method., , , and . BIBM, page 435-442. IEEE, (2016)New multi-step sampling with adaptive sampling patterns in particle filtering for tracking in surveillance systems., and . ICCE, page 286-287. IEEE, (2013)Vehicle Recognition Using VIBE and SVM, , and . Computer Science & Engineering: An International Journal (CSEIJ), 06 (04): 21-29 (August 2017)Semi-supervised low rank kernel learning algorithm via extreme learning machine., , , , and . Int. J. Machine Learning & Cybernetics, 8 (3): 1039-1052 (2017)Another Improvement of LMAP++: An RFID Authentication Protocol., , and . ISCTCS, volume 426 of Communications in Computer and Information Science, page 100-106. Springer, (2013)An Anomaly Detection Model Based on Cloud Model and Danger Theory., , and . ISCTCS, volume 426 of Communications in Computer and Information Science, page 115-122. Springer, (2013)Mining Opinion Words and Targets from Online Reviews in a Hybrid Framework., , , , and . WI-IAT (3), page 9-12. IEEE Computer Society, (2015)978-1-4673-9618-9.Impact of IT Product Compatibility Initiatives on the Market Value of Firms., , , and . ECIS, page 238. (2012)