Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't have a stemmer?: be un+concern+ed., , and . SIGIR, page 813-814. ACM, (2008)Lempel-Ziv Jaccard Distance, an Effective Alternative to Ssdeep and Sdhash., and . CoRR, (2017)Topological analysis of an online social network for older adults., and . SSM, page 51-58. ACM, (2008)Visualizing Document Authorship Using n-grams and Latent Semantic Indexing., , , and . Workshop on New Paradigms in Information Visualization and Manipulation, page 43-48. ACM, (1997)A Quantum Algorithm to Locate Unknown Hashgrams., and . FTC (3), volume 561 of Lecture Notes in Networks and Systems, page 273-285. Springer, (2022)Agents Making Sense of the Semantic Web., , , , , , , , , and . WRAC, volume 2564 of Lecture Notes in Computer Science, page 417-433. Springer, (2002)An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance., and . KDD, page 1007-1015. ACM, (2017)UMBC at TREC 12., , , , , , , , , and . TREC, volume 500-255 of NIST Special Publication, page 699-706. National Institute of Standards and Technology (NIST), (2003)Malware Detection by Eating a Whole EXE., , , , , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 268-276. AAAI Press, (2018)Agent Development Support for Tcl., , , , , and . Tcl/Tk Workshop, USENIX Association, (1997)