Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unisys: description of the Unisys system used for MUC-3., , , and . MUC, page 212-222. ACL, (1991)Preface., , , , , and . AAAI Fall Symposium: Regarding the Intelligence in Distributed Intelligent Systems, volume FS-07-06 of AAAI Technical Report, AAAI Press, (2007)Cyber-All-Intel: An AI for Security related Threat Intelligence., , and . CoRR, (2019)JETS: Achieving Completeness through Coverage and Closure., , and . IJCAI, page 275-281. William Kaufmann, (1979)HLTCOE Participation at TAC 2013., , , and . TAC, NIST, (2013)HLTCOE Participation in TAC KBP 2015: Cold Start and TEDL., , , , , , , , , and . TAC, NIST, (2015)App behavioral analysis using system calls., , and . INFOCOM Workshops, page 487-492. IEEE, (2017)Meerkat Mafia: Multilingual and Cross-Level Semantic Textual Similarity Systems., , , , , , and . SemEval@COLING, page 416-423. The Association for Computer Linguistics, (2014)Ebiquity: Paraphrase and Semantic Similarity in Twitter using Skipgrams., , and . SemEval@NAACL-HLT, page 51-55. The Association for Computer Linguistics, (2015)Assured Information Sharing Life Cycle., , , , , , , , , and 10 other author(s). ISI, page 307-309. IEEE, (2009)