Author of the publication

Hierarchical Directed Acyclic Graph Kernel: Methods for Structured Natural Language Data.

, , , and . ACL, page 32-39. ACL, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontology-Based Driving Decision Making: A Feasibility Study at Uncontrolled Intersections., , , , and . IEICE Trans. Inf. Syst., 100-D (7): 1425-1439 (2017)Bib2vec: An Embedding-based Search System for Bibliographic Information., , , and . CoRR, (2017)Clinical text classification under the Open and Closed Topic Assumptions., , and . IJDMB, 3 (3): 299-313 (2009)Integrating heterogeneous knowledge graphs into drug-drug interaction extraction from the literature., , and . Bioinform., (January 2023)An Ontology-Based Intelligent Speed Adaptation System for Autonomous Cars., , , and . JIST, volume 8943 of Lecture Notes in Computer Science, page 397-413. Springer, (2014)Two evaluations on Ontology-style relation annotations., , and . Comput. Speech Lang., (March 2024)TTI-COIN at SemEval-2017 Task 10: Investigating Embeddings for End-to-End Relation Extraction from Scientific Papers., , and . SemEval@ACL, page 985-989. Association for Computational Linguistics, (2017)An application of robust power system security to power system operation for high-penetration of PV., , , , , and . ISGT Europe, page 1-7. IEEE, (2012)Developing Client-Server Speech Translation Platform., , , , , , and . MDM, page 141. IEEE Computer Society, (2006)A concept of Robust Power System Security and its application under renewable energy sources penetration., , , , , and . ISGT, page 1-7. IEEE, (2012)