Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nearest Neighbor Query., and . Encyclopedia of GIS, Springer, (2017)Exploiting efficient data mining techniques to enhance intrusion detection systems., , and . IRI, page 512-517. IEEE Systems, Man, and Cybernetics Society, (2005)Online Spatial Event Forecasting in Microblogs., , , and . ACM Trans. Spatial Algorithms Syst., 2 (4): 15:1-15:39 (2016)Batman or the joker?: the powerful urban computing and its ethics issues., , , and . ACM SIGSPATIAL Special, 11 (2): 16-25 (2019)Mitigating Influence of Disinformation Propagation Using Uncertainty-Based Opinion Interactions., , and . IEEE Trans. Comput. Soc. Syst., 10 (2): 435-447 (April 2023)Fast adaptive kernel density estimator for data streams., , and . Knowl. Inf. Syst., 42 (2): 285-317 (2015)Don't Go To Extremes: Revealing the Excessive Sensitivity and Calibration Limitations of LLMs in Implicit Hate Speech Detection., , , and . CoRR, (2024)Learning Decentralized Flocking Controllers with Spatio-Temporal Graph Neural Network., , , , and . CoRR, (2023)Can LLM find the green circle? Investigation and Human-guided tool manipulation for compositional generalization., , , , , and . CoRR, (2023)Misinformation Propagation in the Age of Twitter., , , , , , and . Computer, 47 (12): 90-94 (2014)