Author of the publication

Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis.

, , and . J. Comput. Sci. Technol., 23 (2): 231-239 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal disclosure in all-pay auctions with interdependent valuations., and . Games Econ. Behav., (January 2024)REMAP+: An Efficient Banking Architecture for Multiple Writes of Algorithmic Memory., , , and . IEEE Trans. Very Large Scale Integr. Syst., 28 (3): 660-671 (2020)Efficient Write Scheme for Algorithm-Based Multi-Ported Memory., , and . VLSI-DAT, page 1-4. IEEE, (2019)A Novel Measuring Method of Capacitive Current for Ungrounded Distribution Systems., , , and . IAS, page 1-5. IEEE, (2008)Book review.. Oper. Res. Lett., 33 (6): 653-654 (2005)A Lower Bound for Randomized On-Line Scheduling Algorithms., , and . Inf. Process. Lett., 51 (5): 219-222 (1994)Sparse linear regression with beta process priors., , and . ICASSP, page 1234-1237. IEEE, (2010)Model Transformation Method for Compensation Events and Tasks from Business Process Model to Flowchart., , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 468-476. Springer, (2012)What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN., , , and . Trustcom/BigDataSE/ISPA, page 481-488. IEEE, (2016)A New Parallel Method of Smith-Waterman Algorithm on a Heterogeneous Platform., , , and . ICA3PP (1), volume 6081 of Lecture Notes in Computer Science, page 79-90. Springer, (2010)