Author of the publication

Using Term Clustering and Supervised Term Affinity Construction to Boost Text Classification.

, and . PAKDD, volume 3518 of Lecture Notes in Computer Science, page 813-819. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Nested HDP for Hierarchical Topic Models, , , and . ICLR (Workshop), (2013)How to Reduce Software Development Cost with Personnel Assignment Optimization: Exemplary Improvement on the Hungarian Algorithm., , , and . EASE, page 270-279. ACM, (2017)Approximate Analysis of Re-Entrant Lines with Bernoulli Reliability Models., and . CASE, page 398-403. IEEE, (2007)Comparative performance analysis of SFH/FDM DRT and OBP satellite payloads under jamming., , and . ICC, page 3190-3194. IEEE, (2012)Short-Term Temporal Convolutional Networks for Dynamic Hand Gesture Recognition., , , , , and . CoRR, (2020)Self-configurable border landmark selection in wireless networks: Algorithms and applications., and . Pervasive Mob. Comput., 6 (1): 128-143 (2010)基于智能电表运行故障数据的纵向分析模型 (Vertical Analysis Based on Fault Data of Running Smart Meter)., , , , , , and . 计算机科学, 46 (6A): 436-438 (2019)Feature Differentiation Reconstruction Network for Weakly-Supervised Video Anomaly Detection., , , and . IEEE Signal Process. Lett., (2023)Simplified particle swarm algorithm based on nonlinear decrease extreme disturbance and Cauchy mutation., , , and . Int. J. Parallel Emergent Distributed Syst., 35 (3): 236-245 (2020)A novel anti-detection criterion for covert storage channel threat estimation., , , , and . Sci. China Inf. Sci., 61 (4): 048101:1-048101:3 (2018)