Author of the publication

Open Web Search at LongEval 2023: Reciprocal Rank Fusion on Automatically Generated Query Variants.

, , , and . CLEF (Working Notes), volume 3497 of CEUR Workshop Proceedings, page 2432-2440. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overview of the 5th author profiling task at pan 2017: Gender and language variety identification in twitter, , , and . Working Notes Papers of the CLEF, (2017)The Effect of Content-Equivalent Near-Duplicates on the Evaluation of Search Engines., , , and . ECIR (2), volume 12036 of Lecture Notes in Computer Science, page 12-19. Springer, (2020)Towards Crowdsourcing Clickbait Labels for YouTube Videos., , , and . HCOMP (WIP&Demo), volume 2173 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Webis at TREC 2021: Deep Learning, Health Misinformation, and Podcasts Tracks., , , , , , , , , and 1 other author(s). TREC, volume 500-335 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2021)Estimating Topic Difficulty Using Normalized Discounted Cumulated Gain., , , and . CIKM, page 2033-2036. ACM, (2020)Opinion Summarization of Web Comments., and . ECIR, volume 5993 of Lecture Notes in Computer Science, page 668-669. Springer, (2010)Overview of Touché 2022: Argument Retrieval - Extended Abstract., , , , , , , , , and 2 other author(s). ECIR (2), volume 13186 of Lecture Notes in Computer Science, page 339-346. Springer, (2022)Bootstrapped nDCG Estimation in the Presence of Unjudged Documents., , , and . ECIR (1), volume 13980 of Lecture Notes in Computer Science, page 313-329. Springer, (2023)Is Google Getting Worse? A Longitudinal Investigation of SEO Spam in Search Engines., , , and . ECIR (3), volume 14610 of Lecture Notes in Computer Science, page 56-71. Springer, (2024)Analyzing Adversarial Attacks on Sequence-to-Sequence Relevance Models., , , , and . ECIR (2), volume 14609 of Lecture Notes in Computer Science, page 286-302. Springer, (2024)