Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Unsupervised Spoken Language Understanding: Exploiting Query Click Logs for Slot Filling., , , and . INTERSPEECH, page 1293-1296. ISCA, (2011)Improving Automatic Sentence Boundary Detection with Confusion Networks., , , , and . HLT-NAACL (Short Papers), The Association for Computational Linguistics, (2004)Improving ad relevance in sponsored search., , , , and . WSDM, page 361-370. ACM, (2010)Reframing Threat Detection: Inside esINSIDER., , , , and . CoRR, (2019)A predictive model for advertiser value-per-click in sponsored search., , and . WWW, page 1179-1190. International World Wide Web Conferences Steering Committee / ACM, (2013)Topic Classification for Conversational Speech using Support Vector Machines and Latent Semantic Analysis. (1996)The sum of its parts: reducing sparsity in click estimation with query segments., , , , , and . Inf. Retr., 14 (3): 315-336 (2011)The ICSI-SRI-UW metadata extraction system., , , , , , and . INTERSPEECH, page 577-580. ISCA, (2004)Speech segmentation and spoken document processing., , , , , , , , , and 7 other author(s). IEEE Signal Process. Mag., 25 (3): 59-69 (2008)Learning Weighted Entity Lists from Web Click Logs for Spoken Language Understanding., , , and . INTERSPEECH, page 705-708. ISCA, (2011)