Author of the publication

Filtering artificial texts with statistical machine learning techniques.

, , and . Lang. Resour. Evaluation, 45 (1): 25-43 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regularity of Congruential Graphs.. MFCS, volume 1893 of Lecture Notes in Computer Science, page 680-689. Springer, (2000)Tracking Web Spam with Hidden Style Similarity., , and . AIRWeb, page 25-31. (2006)A stochastic bandit algorithm for scratch games., and . ACML, volume 25 of JMLR Proceedings, page 129-143. JMLR.org, (2012)Stumping along a Summary for Exploration & Exploitation Challenge 2011., and . ICML On-line Trading of Exploration and Exploitation, volume 26 of JMLR Proceedings, page 86-97. JMLR.org, (2012)Denoising Pre-Training and Data Augmentation Strategies for Enhanced RDF Verbalization with Transformers., , , , and . CoRR, (2020)Exploration and exploitation of scratch games., and . Mach. Learn., 92 (2-3): 377-401 (2013)Plateforme d'étiquetage dynamique pour la fouille d'opinion., and . CORIA, page 307-322. UNINE, (2013)Tracking Web spam with HTML style similarities., , , and . TWEB, 2 (1): 3:1-3:28 (2008)Neural-Driven Search-Based Paraphrase Generation., , , and . EACL, page 2100-2111. Association for Computational Linguistics, (2021)Composition of Path Transductions.. ICGT, volume 3256 of Lecture Notes in Computer Science, page 368-382. Springer, (2004)