Author of the publication

Application of Spreading Activation Techniques in Information Retrieval.

. Artif. Intell. Rev., 11 (6): 453-482 (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial message: special track on information access and retrieval., and . SAC, page 1018-1019. ACM, (2006)Experimenting with graphical user interfaces for structured document retrieval., , and . SIGIR, page 373-374. ACM, (2002)i-JEN: Visual Interactive Malaysia Crime News Retrieval System., , , , , and . IVIC (2), volume 7067 of Lecture Notes in Computer Science, page 284-294. Springer, (2011)Linguistic aggregation methods in blog retrieval., and . Inf. Process. Manag., 48 (3): 467-475 (2012)eRisk 2020: Self-harm and Depression Challenges., , and . ECIR (2), volume 12036 of Lecture Notes in Computer Science, page 557-563. Springer, (2020)Are Conversation Logs Useful Sources for Generating Memory Cues for Recalling Past Memories?, and . LTA@MM, page 13-20. ACM, (2017)Joint Collaborative Ranking with Social Relationships in Top-N Recommendation., and . CIKM, page 1393-1402. ACM, (2016)Supporting Searching on Small Screen Devices Using Summarisation., and . Mobile HCI Workshop on Mobile and Ubiquitous Information Access, volume 2954 of Lecture Notes in Computer Science, page 187-201. Springer, (2003)A Regularization Method with Inference of Trust and Distrust in Recommender Systems., and . ECML/PKDD (2), volume 10535 of Lecture Notes in Computer Science, page 253-268. Springer, (2017)Online conversation mining for author characterization and topic identification., and . PIKM@CIKM, page 19-26. ACM, (2011)