Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Role Activity Diagrams and Hybrid IDEF for Business Process Modeling Using MDA., , , , and . SYNASC, page 71-74. IEEE Computer Society, (2005)Obligations and Permissions.. Lang. Linguistics Compass, 6 (9): 593-610 (2012)The ontology of language - properties, individuals and discourses.. CSLI lecture notes series CSLI Publications, (2000)Relating Natural Language Text to Musical Passages., , , , , and . ISMIR, page 524-530. (2015)Exploring Clustering for Multi-document Arabic Summarisation., , and . AIRS, volume 7097 of Lecture Notes in Computer Science, page 550-561. Springer, (2011)A Framework for the Hyperintensional Semantics of Natural Language with Two Implementations., and . LACL, volume 2099 of Lecture Notes in Computer Science, page 175-192. Springer, (2001)A type-theoretic approach to anaphora and ellipsis resolution., and . RANLP, volume 260 of Current Issues in Linguistic Theory (CILT), page 1-16. John Benjamins, Amsterdam/Philadelphia, (2003)Privacy Nudging in Search: Investigating Potential Impacts., , , and . CHIIR, page 283-287. ACM, (2019)An Expressive First-Order Logic with Flexible Typing for Natural Language Semantics., and . Logic Journal of the IGPL, 12 (2): 135-168 (2004)The Influence of Text Pre-processing on Plagiarism Detection., and . RANLP, page 55-59. RANLP 2009 Organising Committee / ACL, (2009)