Author of the publication

Overview of the Author Obfuscation Task at PAN 2017: Safety Evaluation Revisited.

, , and . CLEF (Working Notes), volume 1866 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dagstuhl seminar 19461 on conversational search: seminar goals and working group outcomes, , , , , and . ACM SIGIR Forum, 54, page 1--11. ACM New York, NY, USA, (2021)A Lower Bound for the HBC Transversal Hypergraph Generation., , and . Fundam. Informaticae, 130 (4): 409-414 (2014)On the fixed-parameter tractability of the equivalence test of monotone normal forms.. Inf. Process. Lett., 103 (4): 163-167 (2007)Modeling the usefulness of search results as measured by information use., , , , and . Inf. Process. Manag., 56 (3): 879-894 (2019)A Keyquery-Based Classification System for CORE., , , and . D Lib Mag., (2014)Anomalieerkennung im Bereich Industrie 4.0, , and . Industrie 4.0 Management, 33 (4): 53--56 (2017)Weblog Analysis., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Exploring LSTMs for Simulating Search Sessions in Digital Libraries., , and . TPDL, volume 13541 of Lecture Notes in Computer Science, page 469-473. Springer, (2022)Heuristic Authorship Obfuscation., , , and . ACL (1), page 1098-1108. Association for Computational Linguistics, (2019)Sparse Pairwise Re-ranking with Pre-trained Transformers., , , and . ICTIR, page 72-80. ACM, (2022)