Author of the publication

Semantic Query Expansion Based on a Question Category Concept List.

, , , and . ICADL, volume 3334 of Lecture Notes in Computer Science, page 501-509. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Semantic Indexing in Text Retrieval., , and . CICLing, volume 2945 of Lecture Notes in Computer Science, page 433-436. Springer, (2004)Cooperative Heterogeneous Network Interworking between WiMAX and WiFi., , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 62-69. Springer, (2011)Sentence Segmentation and Coordination Construction Processing with FB-LTAG., , , and . IC-AI, page 558-567. CSREA Press, (2003)Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme., and . NPC, volume 7513 of Lecture Notes in Computer Science, page 581-588. Springer, (2012)Exploiting Question Concepts for Query Expansion., , , and . CICLing, volume 3406 of Lecture Notes in Computer Science, page 624-627. Springer, (2005)Semantic Query Expansion Based on a Question Category Concept List., , , and . ICADL, volume 3334 of Lecture Notes in Computer Science, page 501-509. Springer, (2004)Fuzzy Information Retrieval Indexed by Concept Identification., , and . TSD, volume 3658 of Lecture Notes in Computer Science, page 179-186. Springer, (2005)Image-Based Malware Classification Using Convolutional Neural Network.. CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 1352-1357. Springer, (2017)Learning Disentangled Representation of Web Address via Convolutional-Recurrent Triplet Network for Classifying Phishing URLs., and . ICEIC, page 1-4. IEEE, (2021)Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol., and . FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 167-176. Springer, (2011)