Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Extreme Right Filter Bubble., , , , and . CoRR, (2013)Identifying Topical Twitter Communities via User List Aggregation, , and . CoRR, (2012)Identifying Discriminating Network Motifs in YouTube Spam, , , and . CoRR, (2012)Network Analysis of Recurring YouTube Spam Campaigns., , , and . ICWSM, The AAAI Press, (2012)Characterizing ego-networks using motifs., , , and . Netw. Sci., 1 (2): 170-190 (2013)How Many Topics? Stability Analysis for Topic Models., , and . ECML/PKDD (1), volume 8724 of Lecture Notes in Computer Science, page 498-513. Springer, (2014)An Analysis of Interactions within and between Extreme Right Communities in Social Media., , , , and . MSM/MUSE, volume 8329 of Lecture Notes in Computer Science, page 88-107. Springer, (2012)An analysis of the coherence of descriptors in topic modeling., , , and . Expert Syst. Appl., 42 (13): 5645-5657 (2015)Uncovering the wider structure of extreme right communities spanning popular online networks., , , , and . WebSci, page 276-285. ACM, (2013)Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-Betweens., , , , , and . CoRR, (2014)