Author of the publication

Using Text Mining to Create Actionable Knowledge: Application to Network Failure Incident Reports.

, , and . PAKM, volume 3336 of Lecture Notes in Computer Science, page 71-81. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UnSeenTimeQA: Time-Sensitive Question-Answering Beyond LLMs' Memorization., , , , , , , and . CoRR, (2024)Visual unrolling of network evolution and the analysis of dynamic discourse?, and . Inf. Vis., 2 (1): 40-50 (2003)Visual Unrolling of Network Evolution and the Analysis of Dynamic Discourse., and . INFOVIS, page 145-151. IEEE Computer Society, (2002)Detecting and Measuring the Polarization Effects of Adversarial Botnets on Twitter., , , and . SAC, page 1641-1649. ACM, (2023)Generating Uncontextualized and Contextualized Questions for Document-Level Event Argument Extraction., , , and . NAACL-HLT, page 5612-5627. Association for Computational Linguistics, (2024)Using Text Mining to Create Actionable Knowledge: Application to Network Failure Incident Reports., , and . PAKM, volume 3336 of Lecture Notes in Computer Science, page 71-81. Springer, (2004)The N2 corpus: A semantically annotated collection of Islamist extremist stories., , and . LREC, page 896-902. European Language Resources Association (ELRA), (2014)Story Detection Using Generalized Concepts and Relations., , , and . ASONAM, page 942-949. ACM, (2015)A System for Ranking Organizations Using Social Scale Analysis., , , , , , , , , and . EISIC, page 308-313. IEEE Computer Soecity, (2011)Assessing Two-Mode Semantic Network Story Representations Using a False Memory Paradigm., , , and . CMN, volume 32 of OASIcs, page 53-61. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2013)