From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comparing classification algorithm for mouse dynamics based user identification., , , , и . BTAS, стр. 61-66. IEEE, (2012)Microblogs as Parallel Corpora., , , , и . ACL (1), стр. 176-186. The Association for Computer Linguistics, (2013)Modeling people's place naming preferences in location sharing., , , и . UbiComp, стр. 75-84. ACM, (2010)An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange., , и . PACIS, стр. 118. AISeL, (2004)Clever clustering vs. simple speed-up for summarizing rushes., , , , , , и . TVS, стр. 20-24. ACM, (2007)CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites., , , и . ACM Trans. Inf. Syst. Secur., 14 (2): 21:1-21:28 (2011)A secure K-automorphism privacy preserving approach with high data utility in social networks., , , , и . Secur. Commun. Networks, 7 (9): 1399-1411 (2014)A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch., , , , , и . ICWSM, The AAAI Press, (2012)A hybrid phish detection approach by identity discovery and keywords retrieval., и . WWW, стр. 571-580. ACM, (2009)Leveraging high-level and low-level features for multimedia event detection., , и . ACM Multimedia, стр. 449-458. ACM, (2012)