Author of the publication

Extracting Events with Informal Temporal References in Personal Histories in Online Communities.

, , , , and . ACL (2), page 836-842. The Association for Computer Linguistics, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing classification algorithm for mouse dynamics based user identification., , , , and . BTAS, page 61-66. IEEE, (2012)Microblogs as Parallel Corpora., , , , and . ACL (1), page 176-186. The Association for Computer Linguistics, (2013)Modeling people's place naming preferences in location sharing., , , and . UbiComp, page 75-84. ACM, (2010)An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange., , and . PACIS, page 118. AISeL, (2004)Clever clustering vs. simple speed-up for summarizing rushes., , , , , , and . TVS, page 20-24. ACM, (2007)CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites., , , and . ACM Trans. Inf. Syst. Secur., 14 (2): 21:1-21:28 (2011)A secure K-automorphism privacy preserving approach with high data utility in social networks., , , , and . Secur. Commun. Networks, 7 (9): 1399-1411 (2014)A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch., , , , , and . ICWSM, The AAAI Press, (2012)Leveraging high-level and low-level features for multimedia event detection., , and . ACM Multimedia, page 449-458. ACM, (2012)A hybrid phish detection approach by identity discovery and keywords retrieval., and . WWW, page 571-580. ACM, (2009)