Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Support Vector Machines for Terrorism Information Extraction., , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 1-12. Springer, (2003)A Distributed Learning Algorithm for Bayesian Inference Networks., and . IEEE Trans. Knowl. Data Eng., 14 (1): 93-105 (2002)Learning to Adapt Web Information Extraction Knowledge and Discovering New Attributes via a Bayesian Approach., and . IEEE Trans. Knowl. Data Eng., 22 (4): 523-536 (2010)Collaborative Information Extraction and Mining from Multiple Web Documents., , and . SDM, page 442-452. SIAM, (2006)Cross Language Information Extraction Knowledge Adaptation., , and . RSKT, volume 5589 of Lecture Notes in Computer Science, page 520-528. Springer, (2009)Using discretization and Bayesian inference network learning for automatic filtering profile generation., and . IEEE Trans. Syst. Man Cybern. Part C, 30 (3): 340-351 (2000)Detection of Shifts in User Interests for Personalized Information Filtering., , , and . SIGIR, page 317-325. ACM, (1996)Adapting Web information extraction knowledge via mining site-invariant and site-dependent features., and . ACM Trans. Internet Techn., 7 (1): 6 (2007)An unsupervised ranking method based on a technical difficulty terrain., , , and . CIKM, page 1989-1992. ACM, (2011)Product Question Intent Detection using Indicative Clause Attention and Adversarial Learning., and . ICTIR, page 75-82. ACM, (2018)