Author of the publication

Estimating Twitter User Location Using Social Interactions-A Content Based Approach.

, , and . SocialCom/PASSAT, page 838-843. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaotic and AES cryptosystem for satellite imagery.. Telecommun. Syst., 52 (2): 573-581 (2013)Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device., , , and . BICS, volume 7888 of Lecture Notes in Computer Science, page 271-277. Springer, (2013)Subjectivity classification and analysis of the ASRS corpus., , and . IRI, page 160-165. IEEE Systems, Man, and Cybernetics Society, (2011)Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication., , , , and . Comput. Math. Appl., 60 (2): 198-208 (2010)MapIt: a case study for location driven knowledge discovery and mining., , and . Int. J. Data Min. Model. Manag., 5 (1): 57-75 (2013)Estimating Twitter User Location Using Social Interactions-A Content Based Approach., , and . SocialCom/PASSAT, page 838-843. IEEE Computer Society, (2011)Performance Evaluation of Video Streaming in Vehicular Adhoc Network., , and . ISA, volume 76 of Communications in Computer and Information Science, page 220-224. Springer, (2010)Spam Trapping System: Novel security framework to fight against spam botnets., , , , and . ICT, page 467-471. IEEE, (2014)Polymorphic Malware Detection Using Hierarchical Hidden Markov Model., , and . DASC, page 151-155. IEEE Computer Society, (2011)Predicted probability enhancement for multi-label text classification using class label pair association., , , and . EAIS, page 70-77. IEEE, (2013)