Author of the publication

ULISBOA at SemEval-2016 Task 12: Extraction of temporal expressions, clinical events and relations using IBEnt.

, , , , , , and . SemEval@NAACL-HLT, page 1263-1267. The Association for Computer Linguistics, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services., , , , , and . Sensors, 18 (3): 753 (2018)ULISBOA at SemEval-2016 Task 12: Extraction of temporal expressions, clinical events and relations using IBEnt., , , , , , and . SemEval@NAACL-HLT, page 1263-1267. The Association for Computer Linguistics, (2016)Inference of driver behavior using correlated IoT data from the vehicle telemetry and the driver mobile phone., , , , , , , and . FedCSIS, volume 18 of Annals of Computer Science and Information Systems, page 487-491. (2019)Adoção da auditabilidade como proposta para identificar informações falsas em redes sociais., , and . WAIHCWS, volume 1714 of CEUR Workshop Proceedings, page 65-71. CEUR-WS.org, (2016)Increasing Information Auditability for Social Network Users., , and . HCI (12), volume 8521 of Lecture Notes in Computer Science, page 536-547. Springer, (2014)Checking Information Reliability in Social Networks Regarding User Behavior and Developers' Effort to Avoid Misinformation., , and . HCI (12), volume 9742 of Lecture Notes in Computer Science, page 151-161. Springer, (2016)Conceitos de transparência como promotores da ética e do üsuário auditor" em sistemas de informação., , and . IHC, page 445-448. ACM, (2014)Monitoring File Integrity Using Blockchain and Smart Contracts., , , and . IEEE Access, (2020)Building up a Verified Page on Facebook Using Information Transparency Guidelines., , and . HCI (13), volume 10283 of Lecture Notes in Computer Science, page 125-137. Springer, (2017)A Proposed Protocol for Periodic Monitoring of Cloud Storage Services Using Trust and Encryption., , , and . ICCSA (2), volume 9787 of Lecture Notes in Computer Science, page 45-59. Springer, (2016)