Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating a news-aware quantitative trader: The effect of momentum and contrarian stock selection strategies, and . Journal of the American Society for Information Science and Technology, 59 (2): 247--255 (2008)Question Answer TARA: A Terrorism Activity Resource Application., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 619-620. Springer, (2005)Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet., , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 62-69. AAAI, (2005)Sports data mining, , and . (2010)IEEE Access Special Section Editorial: Machine Learning Designs, Implementations and Techniques., , , and . IEEE Access, (2020)Machine learning the harness track: Crowdsourcing and varying race history.. Decis. Support Syst., 54 (3): 1370-1379 (2013)Terror tracker system: a web portal for terrorism research., , , and . JCDL, page 416. ACM, (2005)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Textual Analysis of Stock Market Prediction Using Financial News Articles., and . AMCIS, page 185. Association for Information Systems, (2006)Predicting Deadly Drug Combinations through a Machine Learning Approach., , , and . PACIS, page 177. (2018)