Author of the publication

Detecting hedges scope based on phrase structures and dependency structures.

, , , , and . NLPKE, page 415-420. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving novelty detection for general topics using sentence level information patterns., and . CIKM, page 238-247. ACM, (2006)Using adaptive range control to optimize 1-hop broadcast coverage in dense wireless networks., , and . SenSys, page 314-315. ACM, (2003)Improvement of Residual Attention Network for Image Classification., , , and . IScIDE (1), volume 11935 of Lecture Notes in Computer Science, page 529-539. Springer, (2019)Designing localization algorithms robust to signal strength attacks., , , and . INFOCOM, page 341-345. IEEE, (2011)Fast reconstruction of atomic-scale STEM-EELS images from sparse sampling., , , , , and . CoRR, (2020)Bit Error Rate Analysis for Modulating Retro-Reflector Free Space Optical Communications With Adaptive Threshold Over Correlated Gamma Gamma Fading Channels., , and . IEEE Communications Letters, 23 (12): 2275-2278 (2019)Reliability analysis for multi-level stress testing with Weibull regression model under the general progressively Type-II censored data., , , and . J. Comput. Appl. Math., (2018)User privacy protection for a mobile commerce alliance., , , and . Electron. Commer. Res. Appl., (2016)Effect of surface passivation on optical and electronic properties of ultrathin silicon nanosheets., , , , , , and . Sci. China Inf. Sci., 55 (6): 1469-1474 (2012)Modeling of Grey Neural Network and Its Applications., , , and . ISICA, volume 5370 of Lecture Notes in Computer Science, page 297-305. Springer, (2008)