Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Carbon-nanotube-based passively mode-locked erbium-doped fiber laser for broadband supercontinuum generation., , and . ICICS, page 1-4. IEEE, (2015)Automatic keyphrase extraction using word embeddings, , , , , and . Soft Computing, (March 2019)Real-World Behavior Analysis through a Social Media Lens., , , and . SBP, volume 7227 of Lecture Notes in Computer Science, page 18-26. Springer, (2012)Trust in Blogosphere., and . Encyclopedia of Database Systems, Springer US, (2009)Multi-Label Informed Feature Selection., , , and . IJCAI, page 1627-1633. IJCAI/AAAI Press, (2016)Bot Detection: Will Focusing on Recall Cause Overall Performance Deterioration?, , , , , and . SBP-BRiMS, volume 11549 of Lecture Notes in Computer Science, page 39-49. Springer, (2019)#suicidal - A Multipronged Approach to Identify and Explore Suicidal Ideation in Twitter., , , , , and . CIKM, page 941-950. ACM, (2019)Traffic grooming in WDM SONET UPSR rings with multiple line speeds., and . INFOCOM, page 718-729. IEEE, (2005)Towards privacy preserving social recommendation under personalized privacy settings., , , , , , and . World Wide Web, 22 (6): 2853-2881 (2019)Exploiting Emojis for Sarcasm Detection., , , and . SBP-BRiMS, volume 11549 of Lecture Notes in Computer Science, page 70-80. Springer, (2019)