Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious website identification using design attribute learning., , and . Int. J. Inf. Sec., 22 (5): 1207-1217 (October 2023)Dynamic memory disambiguation for array references., , and . MICRO, page 105-111. ACM / IEEE Computer Society, (1994)A Study of Human Summaries of Scientific Articles., , , , and . CoRR, (2020)The distributed and parallel NIC server., , and . Future Gener. Comput. Syst., 8 (1-3): 165-181 (1992)From "More Like This" to "Better Than This"., , and . ICTIR, page 195-198. ACM, (2016)A statistical approach to mining customers' conversational data from social media., , , , , , , , and . IBM J. Res. Dev., 57 (3/4): 14 (2013)Conversational Document Prediction to Assist Customer Care Agents., , , , , , , , and . EMNLP (1), page 349-356. Association for Computational Linguistics, (2020)QAID: Question Answering Inspired Few-shot Intent Detection., , , , , and . ICLR, OpenReview.net, (2023)Compiler techniques for data prefetching on the PowerPC., , and . PACT, page 19-26. IFIP Working Group on Algol / ACM, (1995)Understanding customer behavior using indoor location analysis and visualization., , , , , , , , , and 1 other author(s). IBM J. Res. Dev., (2014)