Author of the publication

Comparative Timeline Summarization via Dynamic Affinity-Preserving Random Walk.

, , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 1778-1785. IOS Press, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Yoshikawa, Masatoshi
add a person with the name Yoshikawa, Masatoshi
 

Other publications of authors with the same name

ILOG: Declarative Creation and Manipulation of Object Identifiers., and . VLDB, page 455-468. Morgan Kaufmann, (1990)Metadata management for integration and analysis of earth observation data., , , and . ICUIMC, page 123-130. ACM, (2009)A Method of Improving Feature Vector for Web Pages Reflecting the Contents of Their Out-Linked Pages., , , and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 891-901. Springer, (2002)Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services., , , , and . CoRR, (2019)A Relevant Score Normalization Method Using Shannon's Information Measure., , , , and . ICADL, volume 3815 of Lecture Notes in Computer Science, page 311-316. Springer, (2005)A Ranking Scheme for XML Information Retrieval Based on Benefit and Reading Effort., and . ICADL, volume 4822 of Lecture Notes in Computer Science, page 230-240. Springer, (2007)Greedy Approximation Algorithms for Generalized Maximum Flow Problem towards Relation Extraction in Information Networks., , and . TJJCCGG, volume 8296 of Lecture Notes in Computer Science, page 132-142. Springer, (2012)Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations., , , and . CoRR, (2017)Alternative Query Generation for XML Keyword Search and Its Optimization., , and . DEXA (1), volume 6860 of Lecture Notes in Computer Science, page 410-424. Springer, (2011)Security of social information from query analysis in DaaS., and . EDBT/ICDT Workshops, volume 360 of ACM International Conference Proceeding Series, page 148-152. ACM, (2009)