Author of the publication

Connecting the Dots Using Contextual Information Hidden in Text and Images.

, , , and . AAAI, page 4220-4221. AAAI Press, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconstructing and evolving software architectures using a coordinated clustering framework., , and . Autom. Softw. Eng., 24 (3): 543-572 (2017)A vulnerability analysis and prediction framework., , , , , and . Comput. Secur., (2020)Encoding Lineage in Scholarly Articles., , , and . AAAI Workshop: Scholarly Big Data, volume WS-16-13 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Concurrent Inference of Topic Models and Distributed Vector Representations., , , , and . ECML/PKDD (2), volume 9285 of Lecture Notes in Computer Science, page 441-457. Springer, (2015)A scalable model for tracking topical evolution in large document collections., , and . IEEE BigData, page 726-735. IEEE Computer Society, (2017)Contextual Embedding for Distributed Representations of Entities in a Text Corpus., , , and . BigMine, volume 53 of JMLR Workshop and Conference Proceedings, page 35-50. JMLR.org, (2016)Performance of PCA Based Semi-supervised Learning in Face Recognition Using MPEG-7 Edge Histogram Descriptor., , , and . J. Multim., 6 (5): 404-415 (2011)Connecting the Dots Using Contextual Information Hidden in Text and Images., , , and . AAAI, page 4220-4221. AAAI Press, (2016)Less is More: Facial Landmarks can Recognize a Spontaneous Smile., , , , , and . BMVC, page 369. BMVA Press, (2022)Analyzing Evolving Trends of Vulnerabilities in National Vulnerability Database., , , , , and . IEEE BigData, page 3011-3020. IEEE, (2018)