Author of the publication

Fondazione Ugo Bordoni at TREC 2004.

, , and . TREC, volume 500-261 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KΘ-affinity privacy: Releasing infrequent query refinements safely., and . Inf. Process. Manag., 51 (2): 74-88 (2015)A survey of Web clustering engines, , , and . ACM Comput. Surv., (July 2009)A Review of Ten Year Research on Query Log Privacy., and . IIR, volume 1653 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Channel estimation for a DS-CDMA mobile radio system with a coherent reception., , and . VTC, page 724-728. IEEE, (1994)Inferring Minimal Rule Covers from Relations., and . AI*IA, volume 1321 of Lecture Notes in Computer Science, page 147-158. Springer, (1997)A lattice conceptual clustering system and its application to browsing retrieval, and . Machine Learning, 24 (2): 95--122 (August 1996)Italian Monolingual Information Retrieval with PROSIT., , and . CLEF, volume 2785 of Lecture Notes in Computer Science, page 257-264. Springer, (2002)Comparing Weighting Models for Monolingual Information Retrieval., , and . CLEF, volume 3237 of Lecture Notes in Computer Science, page 310-318. Springer, (2003)Learning to detect and measure fake ecommerce websites in search-engine results., and . WI, page 403-410. ACM, (2017)Using Concept Lattices for Text Retrieval and Mining., and . Formal Concept Analysis, volume 3626 of Lecture Notes in Computer Science, page 161-179. Springer, (2005)