Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database Similarity Join for Metric Spaces., , and . SISAP, volume 8199 of Lecture Notes in Computer Science, page 266-279. Springer, (2013)Storing data once in M-trees and PM-trees: Revisiting the building principles of metric access methods., , and . Inf. Syst., (2022)PI-Bully: Personalized Cyberbullying Detection with Peer Influence., , , , and . IJCAI, page 5829-5835. ijcai.org, (2019)Hierarchical Attention Networks for Cyberbullying Detection on the Instagram Social Network., , , , and . SDM, page 235-243. SIAM, (2019)BullyBlocker: Towards the identification of cyberbullying in social networking sites., , and . ASONAM, page 1377-1379. IEEE Computer Society, (2016)Exploiting similarity-aware grouping in decision support systems., , and . EDBT, volume 360 of ACM International Conference Proceeding Series, page 1144-1147. ACM, (2009)Mitigating Bias in Session-based Cyberbullying Detection: A Non-Compromising Approach., , , , and . ACL/IJCNLP (1), page 2158-2168. Association for Computational Linguistics, (2021)Supporting real-world activities in database management systems., , , , and . ICDE, page 808-811. IEEE Computer Society, (2010)Similarity Group-By operators for multi-dimensional relational data., , , , , , and . ICDE, page 1448-1449. IEEE Computer Society, (2016)An Experimental Survey of MapReduce-Based Similarity Joins., , , , and . SISAP, volume 9939 of Lecture Notes in Computer Science, page 181-195. (2016)