Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating and Reading Realistic Electronic Books., , and . Computer, 42 (2): 72-81 (2009)Feature specific progressive improvement for salient object detection., , , and . Pattern Recognit., (March 2024)Cloud-Based Video Monitoring Framework: An Approach Based on Software-Defined Networking for Addressing Scalability Problems., , , and . WISE Workshops, volume 9051 of Lecture Notes in Computer Science, page 176-189. Springer, (2014)Detecting the target of sarcasm is hard: Really??, , , and . Inf. Process. Manag., 58 (4): 102599 (2021)Resilient Activities Tracking in a Smart Home using Ultrasonic Sensors., , , and . IEEE BigData, page 5274-5281. IEEE, (2019)Efficient Process Model Discovery Using Maximal Pattern Mining., , and . BPM, volume 9253 of Lecture Notes in Computer Science, page 441-456. Springer, (2015)Evaluating social spammer detection systems., , , and . ACSW, page 18:1-18:7. ACM, (2018)Evaluation of Statistical Text Normalisation Techniques for Twitter., , , and . KDIR, page 413-418. SciTePress, (2016)Detecting Target of Sarcasm using Ensemble Methods., , , and . ALTA, page 197-203. Australasian Language Technology Association, (2019)Future-Proofing Kiwi Kids Through the Use of Digital Technology., , , and . SIGCSE, page 507-513. ACM, (2020)