Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reference collection for web spam., , , , , , and . SIGIR Forum, 40 (2): 11-24 (2006)Mining Large Networks with Subgraph Counting., , , and . ICDM, page 737-742. IEEE Computer Society, (2008)Query log mining for detecting polysemy and spam, , , , and . Proceedings of WebKDD, Las Vegas, USA, Springer, (August 2008)The JXP Method for Robust PageRank Approximation in a Peer-to-Peer Web Search Network, , , , and . VLDB Journal, 17 (2): 291--313 (2008)Temporal Evolution of the Wikigraph, , , , and . Proceedings of Web Intelligence, page 45--51. Hong Kong, IEEE CS Press., (December 2006)Temporal Analysis of the Wikigraph., , , , and . Web Intelligence, page 45-51. IEEE Computer Society, (2006)Graph Structures and Algorithms for Query-Log Analysis.. CiE, volume 6158 of Lecture Notes in Computer Science, page 126-131. Springer, (2010)Estimating Number of Citations Using Author Reputation., , and . SPIRE, volume 4726 of Lecture Notes in Computer Science, page 107-117. Springer, (2007)On the Determination of Inlining Vectors for Program Optimization., , , , , and . CC, volume 7791 of Lecture Notes in Computer Science, page 164-183. Springer, (2013)Stability and Similarity of Link Analysis Ranking Algorithms., , and . ICALP, volume 3580 of Lecture Notes in Computer Science, page 717-729. Springer, (2005)