Author of the publication

Exploiting social relations for query expansion and result ranking.

, , , , , , , and . ICDE Workshops, page 501-506. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System R (R*) Optimizer., and . Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Cost Models and Performance Evaluation of Similarity Search in the HON P2P System., and . ISPA, volume 4330 of Lecture Notes in Computer Science, page 772-781. Springer, (2006)Diversifying search results of controversial queries., and . CIKM, page 93-98. ACM, (2011)CAVE: Correcting Attribute Values in E-commerce Profiles., , and . CIKM, page 4965-4969. ACM, (2022)GAVI: A Category-Aware Generative Approach for Brand Value Identification., , and . ICNLSP, page 110-119. Association for Computational Linguistics, (2023)Evaluation study of a distributed caching based on query similarity in a P2P network., and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 26. ACM, (2007)IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones., , , and . Pattern Recognit. Lett., (2022)Databases, information retrieval and knowledge management: exploring paths and crossing bridges., , and . SIGMOD Record, 42 (3): 71-74 (2013)Density-Based Clustering for Similarity Search in a P2P Network., and . CCGRID, page 57-64. IEEE Computer Society, (2006)Dimensionality Reduction in a P2P System., and . DEXA Workshops, page 804-808. IEEE Computer Society, (2007)