Author of the publication

Inductive Knowledge Graph Completion with GNNs and Rules: An Analysis.

, , , and . LREC/COLING, page 9036-9049. ELRA and ICCL, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining heterogeneous terrorist attack network using personalized PageRank., , and . Web Intell., 16 (1): 37-52 (2018)Network Sampling Using k-hop Random Walks for Heterogeneous Network Embedding., , , , , , and . COMAD/CODS, page 354-357. ACM, (2019)Link Prediction Using Social Network Analysis over Heterogeneous Terrorist Network., , , , , , and . SmartCity, page 267-272. IEEE Computer Society, (2015)On Applying Meta-path for Network Embedding in Mining Heterogeneous DBLP Network., , and . PReMI (2), volume 11942 of Lecture Notes in Computer Science, page 249-257. Springer, (2019)Inductive Knowledge Graph Completion with GNNs and Rules: An Analysis., , , and . LREC/COLING, page 9036-9049. ELRA and ICCL, (2024)Personalised PageRank as a Method of Exploiting Heterogeneous Network for Counter Terrorism and Homeland Security., , and . WI, page 327-334. IEEE Computer Society, (2016)Modeling evolution of a social network using temporalgraph kernels., , and . SIGIR, page 1051-1054. ACM, (2014)Prioritised Moderation for Online Advertising., , , and . CVPR Workshops, page 2004-2012. IEEE, (2023)Human Action Recognition using Skeleton features., , , , and . ISMAR Adjunct, page 289-296. IEEE, (2022)