Author of the publication

Subtopic-Level Sentiment Analysis of Emergencies.

, , , , , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 312-317. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proactive replication for rare objects in unstructured peer-to-peer networks., , , and . J. Netw. Comput. Appl., 35 (1): 85-96 (2012)Type-2 fuzzy description logic., , , , , and . Frontiers Comput. Sci. China, 5 (2): 205-215 (2011)A New Vector Space Model Exploiting Semantic Correlations of Social Annotations for Web Page Clustering., , , , , and . WAIM, volume 6897 of Lecture Notes in Computer Science, page 106-117. Springer, (2011)Optimizing ranking method using social annotations based on language model., , , and . Artif. Intell. Rev., 41 (1): 81-96 (2014)PercolationNET: A multi-tree P2P overlay network supporting high coverage search., , , , and . Int. J. Parallel Emergent Distributed Syst., 25 (1): 73-89 (2010)LIMTopic: A Framework of Incorporating Link Based Importance into Topic Modeling., , , , , and . IEEE Trans. Knowl. Data Eng., 26 (10): 2493-2506 (2014)Optimizing Academic Conference Classification Using Social Tags., , , and . CSE, page 289-294. IEEE Computer Society, (2010)Topic-based ranking in Folksonomy via probabilistic model., , , , and . Artif. Intell. Rev., 36 (2): 139-151 (2011)An Analysis Method for Time-Based Features of Malicious Domains Based on Time Series Clustering., , , , and . WISA, volume 14094 of Lecture Notes in Computer Science, page 347-358. Springer, (2023)A Semantic Search Conceptual Model and Application in Security Access Control., , , , and . ASWC, volume 4185 of Lecture Notes in Computer Science, page 366-376. Springer, (2006)