Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An experimental study on the measurement of data sensitivity., , , and . BADGERS@EuroSys, page 70-77. ACM, (2011)MAGICAL demonstration: system for automated metadata generation for instructional content., , , , , and . ACM Multimedia, page 491-492. ACM, (2006)A biplot correlation range for group-wise metabolite selection in mass spectrometry., , , , and . BioData Min., 12 (1): 4:1-4:24 (2019)Split-NER: Named Entity Recognition via Two Question-Answering-based Classifications., and . ACL (2), page 416-426. Association for Computational Linguistics, (2023)An Ontology-driven Knowledge Graph for Android Malware., , , and . CCS, page 2435-2437. ACM, (2021)DinTucker: Scaling Up Gaussian Process Models on Large Multidimensional Arrays., , , , , and . AAAI, page 2386-2392. AAAI Press, (2016)Hybrid Text Mining for Finding Abbreviations and their Definitions., and . EMNLP, ACL, (2001)Discovery of metabolite features for the modelling and analysis of high-resolution NMR spectra., , , , , , and . IJDMB, 2 (2): 176-192 (2008)Semi-automated logging of contact center telephone calls., , , , , , and . CIKM, page 133-142. ACM, (2008)Data classification and sensitivity estimation for critical asset discovery., , , and . IBM J. Res. Dev., 60 (4): 2 (2016)