Author of the publication

Visual Unrolling of Network Evolution and the Analysis of Dynamic Discourse.

, and . INFOVIS, page 145-151. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using activity focus networks to pressure terrorist organizations.. Comput. Math. Organ. Theory, 12 (1): 35-49 (2006)Exploring Evolving Media Discourse Through Event Cueing., , , , , , , , and . IEEE Trans. Vis. Comput. Graph., 22 (1): 220-229 (2016)STIF: Semi-Supervised Taxonomy Induction using Term Embeddings and Clustering., , , , , and . NLPIR, page 115-123. ACM, (2021)A Semantic Triplet Based Story Classifier., , , , and . ASONAM, page 573-580. IEEE Computer Society, (2012)Using Text Mining to Create Actionable Knowledge: Application to Network Failure Incident Reports., , and . PAKM, volume 3336 of Lecture Notes in Computer Science, page 71-81. Springer, (2004)The N2 corpus: A semantically annotated collection of Islamist extremist stories., , and . LREC, page 896-902. European Language Resources Association (ELRA), (2014)Revisiting the accuracy problem in network analysis using a unique dataset., , , , , , , and . Soc. Networks, (2021)A System for Ranking Organizations Using Social Scale Analysis., , , , , , , , , and . EISIC, page 308-313. IEEE Computer Soecity, (2011)Story Detection Using Generalized Concepts and Relations., , , and . ASONAM, page 942-949. ACM, (2015)A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts., , , , , , and . ICDIS, page 26-33. IEEE, (2020)