Author of the publication

Using Support Vector Machines for Terrorism Information Extraction.

, , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 1-12. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Clozing to Comprehending: Retrofitting Pre-trained Language Model to Pre-trained Machine Reader., , , , , , and . CoRR, (2022)Context-aware Helpfulness Prediction for Online Product Reviews., , and . CoRR, (2020)Improving Lexical Embeddings for Robust Question Answering., , , and . CoRR, (2022)A Comprehensive Survey on Deep Learning for Relation Extraction: Recent Advances and New Frontiers., , , , , , , , and . CoRR, (2023)StrategyLLM: Large Language Models as Strategy Generators, Executors, Optimizers, and Evaluators for Problem Solving., , , , and . CoRR, (2023)Using Support Vector Machines for Terrorism Information Extraction., , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 1-12. Springer, (2003)Cross Language Information Extraction Knowledge Adaptation., , and . RSKT, volume 5589 of Lecture Notes in Computer Science, page 520-528. Springer, (2009)Using discretization and Bayesian inference network learning for automatic filtering profile generation., and . IEEE Trans. Syst. Man Cybern. Part C, 30 (3): 340-351 (2000)A Distributed Learning Algorithm for Bayesian Inference Networks., and . IEEE Trans. Knowl. Data Eng., 14 (1): 93-105 (2002)Learning to Adapt Web Information Extraction Knowledge and Discovering New Attributes via a Bayesian Approach., and . IEEE Trans. Knowl. Data Eng., 22 (4): 523-536 (2010)