Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UCD SIFT in the TREC 2010 Web Track., , , , , and . TREC, volume 500-294 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2010)UCD SIFT in the TREC 2009 Web Track., , , , and . TREC, volume 500-278 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2009)Mining Web Logs for Personalized Site Maps., and . WISE Workshops, page 232-237. IEEE Computer Society, (2002)Toward zero-input personalization: Referrer-based Page Recommendation, , and . Proceedings of the International Conference on Adaptive Hypermedia and Adaptive Web-based Systems, page 133--143. (2000)Extending Probabilistic Data Fusion Using Sliding Windows., , , and . ECIR, volume 4956 of Lecture Notes in Computer Science, page 358-369. Springer, (2008)Phishing detection using classifier ensembles., and . eCrime, page 1-9. IEEE, (2009)UCD SIFT in the TREC 2011 Web Track., , , , , and . TREC, volume 500-296 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2011)Applying Machine Learning Diversity Metrics to Data Fusion in Information Retrieval., , , , , and . ECIR, volume 6611 of Lecture Notes in Computer Science, page 695-698. Springer, (2011)The threats of social networking: Old wine in new bottles?, , and . Inf. Secur. Tech. Rep., 16 (2): 38-43 (2011)A Self-configuring Agent-Based Document Indexing System., , , , , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 624-627. Springer, (2005)