Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Support Vector Machines for Terrorism Information Extraction., , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 1-12. Springer, (2003)Context-aware Helpfulness Prediction for Online Product Reviews., , and . CoRR, (2020)From Clozing to Comprehending: Retrofitting Pre-trained Language Model to Pre-trained Machine Reader., , , , , , and . CoRR, (2022)Improving Lexical Embeddings for Robust Question Answering., , , and . CoRR, (2022)StrategyLLM: Large Language Models as Strategy Generators, Executors, Optimizers, and Evaluators for Problem Solving., , , , and . CoRR, (2023)A Comprehensive Survey on Deep Learning for Relation Extraction: Recent Advances and New Frontiers., , , , , , , , and . CoRR, (2023)Exploiting interactions of review text, hidden user communities and item groups, and time for collaborative filtering., , , and . Knowl. Inf. Syst., 52 (1): 221-254 (2017)Collaborative Information Extraction and Mining from Multiple Web Documents., , and . SDM, page 442-452. SIAM, (2006)Learning to Adapt Web Information Extraction Knowledge and Discovering New Attributes via a Bayesian Approach., and . IEEE Trans. Knowl. Data Eng., 22 (4): 523-536 (2010)A Distributed Learning Algorithm for Bayesian Inference Networks., and . IEEE Trans. Knowl. Data Eng., 14 (1): 93-105 (2002)