Author of the publication

Extending Probabilistic Data Fusion Using Sliding Windows.

, , , and . ECIR, volume 4956 of Lecture Notes in Computer Science, page 358-369. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UCD SIFT in the TREC 2010 Web Track., , , , , and . TREC, volume 500-294 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2010)UCD SIFT in the TREC 2009 Web Track., , , , and . TREC, volume 500-278 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2009)Toward zero-input personalization: Referrer-based Page Recommendation, , and . Proceedings of the International Conference on Adaptive Hypermedia and Adaptive Web-based Systems, page 133--143. (2000)Phishing detection using classifier ensembles., and . eCrime, page 1-9. IEEE, (2009)Extending Probabilistic Data Fusion Using Sliding Windows., , , and . ECIR, volume 4956 of Lecture Notes in Computer Science, page 358-369. Springer, (2008)Mining Web Logs for Personalized Site Maps., and . WISE Workshops, page 232-237. IEEE Computer Society, (2002)UCD SIFT in the TREC 2011 Web Track., , , , , and . TREC, volume 500-296 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2011)A Self-configuring Agent-Based Document Indexing System., , , , , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 624-627. Springer, (2005)ProbFuse: a probabilistic approach to data fusion., , , and . SIGIR, page 139-146. ACM, (2006)The threats of social networking: Old wine in new bottles?, , and . Inf. Secur. Tech. Rep., 16 (2): 38-43 (2011)