From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Seeking provenance of information using social media., , и . CIKM, стр. 1691-1696. ACM, (2013)Social Provenance., , и . Encyclopedia of Social Network Analysis and Mining, (2014)Multi-Constrained Anypath Routing in Wireless Mesh Networks., , , и . SECON, стр. 475-483. IEEE, (2010)Modeling and Computational Characterization of Twitter Customer Service Conversations., , , , и . ACM Trans. Interact. Intell. Syst., 9 (2-3): 18:1-18:28 (2019)Exploiting vulnerability to secure user privacy on a social networking site., , и . KDD, стр. 511-519. ACM, (2011)Teacher-Student Learning Paradigm for Tri-training: An Efficient Method for Unlabeled Data Exploitation., , , , и . KONVENS, (2019)"How May I Help You?": Modeling Twitter Customer ServiceConversations Using Fine-Grained Dialogue Acts., , , , и . IUI, стр. 343-355. ACM, (2017)A tool for collecting provenance data in social media., , , и . KDD, стр. 1462-1465. ACM, (2013)User Vulnerability and Its Reduction on a Social Networking Site., , , и . ACM Trans. Knowl. Discov. Data, 9 (2): 12:1-12:25 (2014)A tool for assisting provenance search in social media., , и . CIKM, стр. 2517-2520. ACM, (2013)