Author of the publication

Detecting Erroneous Sentences using Automatically Mined Sequential Patterns.

, , , , , , and . ACL, The Association for Computational Linguistics, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid beaconless geographic routing for different packets in WSN., , and . Wireless Networks, 22 (4): 1107-1120 (2016)FADS: Circular/Spherical Sector based Forwarding Area Division and Adaptive Forwarding Area Selection routing protocol in WSNs., , , , , and . Ad Hoc Networks, (2018)A local-gravitation-based method for the detection of outliers and boundary points., , , , and . Knowl. Based Syst., (2020)Semantic Role Labeling for News Tweets., , , , , , and . COLING, page 698-706. Tsinghua University Press, (2010)The Spoken/Written Language Classification of English Sentences with Bilingual Information., , , , , and . NLPCC, volume 400 of Communications in Computer and Information Science, page 370-377. Springer, (2013)Network Anomaly Detection Based on DSOM and ACO Clustering., , , , and . ISNN (2), volume 4492 of Lecture Notes in Computer Science, page 947-955. Springer, (2007)Location difference of multiple distances based k-nearest neighbors algorithm., , , , and . Knowl. Based Syst., (2015)A Learning Framework for Transitioning Network Intrusion Alerts Management System to Ontology., , , , , and . J. Res. Pract. Inf. Technol., 43 (3): 247- (2011)Intrusion Detection Based on Dynamic Self-organizing Map Neural Network Clustering., , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 428-433. Springer, (2005)Enhancing Semantic Role Labeling for Tweets Using Self-Training., , , and . AAAI, page 896-901. AAAI Press, (2011)