Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering of Social Tagging System Users: A Topic and Time Based Approach., , , and . WISE, volume 5802 of Lecture Notes in Computer Science, page 75-86. Springer, (2009)XML-Based Revocation and Delegation in a Distributed Environment., , , and . EDBT Workshops, volume 3268 of Lecture Notes in Computer Science, page 299-308. Springer, (2004)Querying XML with Constraints., , and . International Conference on Internet Computing (1), page 171-177. CSREA Press, (2001)Security Model for XML Data., , and . International Conference on Internet Computing (1), page 400-406. CSREA Press, (2001)Local community detection with hints., , and . Appl. Intell., 52 (9): 9599-9620 (2022)Dissimilarity Features in Recommender Systems., , and . ICDM Workshops, page 825-832. IEEE Computer Society, (2013)Class-based Prediction Errors to Detect Hate Speech with Out-of-vocabulary Words., , , , , and . ALW@ACL, page 36-40. Association for Computational Linguistics, (2017)ND-Sync: Detecting Synchronized Fraud Activities., , , , , and . PAKDD (2), volume 9078 of Lecture Notes in Computer Science, page 201-214. Springer, (2015)Mean Birds: Detecting Aggression and Bullying on Twitter., , , , , and . WebSci, page 13-22. ACM, (2017)UnStressMe: Explainable Stress Analytics and Self-tracking Data Visualizations., , and . PerCom Workshops, page 340-342. IEEE, (2023)