Author of the publication

Utilizing Mind-Maps for Information Retrieval and User Modelling.

, , , and . UMAP, volume 8538 of Lecture Notes in Computer Science, page 301-313. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Academic Search Engine Spam and Google Scholar’s Resilience Against it, and . Journal of Electronic Publishing, (December 2010)Decentralized Trusted Timestamping using the Crypto Currency Bitcoin., , and . CoRR, (2015)Design Thinking using the Blockchain: Enable Traceability of Intellectual Property in Problem-Solving Processes for Open Innovation., , and . CRYBLOCK@MobiSys, page 105-110. ACM, (2018)Introducing MathQA - A Math-Aware Question Answering System., , , , , and . CoRR, (2019)Illegal Aliens or Undocumented Immigrants? Towards the Automated Identification of Bias by Word Choice and Labeling., , and . iConference, volume 11420 of Lecture Notes in Computer Science, page 179-187. Springer, (2019)Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space., and . JCDL, page 197-200. IEEE Computer Society, (2014)A Vision for Performing Social and Economic Data Analysis using Wikipedia's Edit History., , , and . WWW (Companion Volume), page 1627-1634. ACM, (2017)AnnoMath TeX - a formula identifier annotation recommender system for STEM documents., , , , , and . RecSys, page 532-533. ACM, (2019)Citation-Based Plagiarism Detection: Practicability on a Large-Scale Scientific Corpus., , and . J. Assoc. Inf. Sci. Technol., 65 (8): 1527-1540 (2014)Interpretable and Comparative Textual Dataset Exploration Using Near-Identity Mention Relations., , and . JCDL, page 457-458. ACM, (2020)