Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quixote: Building XML Repositories from Topic Specific Web Documents., , and . WebDB, page 103-108. (2001)Static Type-Inference for Trust in Distributed Information Systems., , and . OTM, volume 2888 of Lecture Notes in Computer Science, page 370-388. Springer, (2003)Large-scale Analysis of Event Data., , and . GvD, volume 1366 of CEUR Workshop Proceedings, page 90-95. CEUR-WS.org, (2015)WeLT: Improving Biomedical Fine-tuned Pre-trained Language Models with Cost-sensitive Learning., , , and . BioNLP@ACL, page 427-438. Association for Computational Linguistics, (2023)Mining email social networks., , , , and . MSR, page 137-143. ACM, (2006)Klexikon: A German Dataset for Joint Summarization and Simplification., and . LREC, page 2693-2701. European Language Resources Association, (2022)Efficient anti-community detection in complex networks., , , and . SSDBM, page 16:1-16:12. ACM, (2018)Deriving Integrity Constraints Maintaining Triggers from Transition Graphs.. Grundlagen von Datenbanken, TR ECRC-92-13, page 40-44. (1992)Beyond friendships and followers: The Wikipedia social network, , and . 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), page 472--479. IEEE, (2015)Reverse Engineering for Web Data: From Visual to Semantic Structures, , and . Data Eng. Int. Conf., (2002)