Author of the publication

Application of Information Technology: A Comparative Evaluation of Full-text, Concept-based, and Context-sensitive Search.

, , , , and . JAMIA, 14 (2): 164-174 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TIRPClo: efficient and complete mining of time intervals-related patterns., and . Data Min. Knowl. Discov., 37 (5): 1806-1857 (September 2023)Using artificial neural networks to detect unknown computer worms., , , , and . Neural Comput. Appl., 18 (7): 663-674 (2009)Vaidurya: A multiple-ontology, concept-based, context-sensitive clinical-guideline search engine., and . J. Biomed. Informatics, 42 (1): 11-21 (2009)Improving condition severity classification with an efficient active learning based framework., , , , , , and . J. Biomed. Informatics, (2016)Application of Information Technology: A Comparative Evaluation of Full-text, Concept-based, and Context-sensitive Search., , , , and . JAMIA, 14 (2): 164-174 (2007)The Digital Electronic Guideline Library (DeGeL): A Hybrid Framework for Representation and Use of Clinical Guidelines., , , , , , and . CGP, volume 101 of Studies in Health Technology and Informatics, page 147-151. IOS Press, (2004)Unknown malcode detection via text categorization and the imbalance problem., , , , and . ISI, page 156-161. IEEE, (2008)Unknown malcode detection - A chronological evaluation., , and . ISI, page 267-268. IEEE, (2008)A Comparative Evaluation of Full-text, Concept-based, and Context-sensitive Search, , , , and . Journal of the American Medical Informatics Association, 14 (2): 164 - 174 (2007)Active learning to improve the detection of unknown computer worms activity., , , and . FUSION, page 1-8. IEEE, (2008)