Author of the publication

A relevance-novelty combined model for genomics search result diversification.

, , , and . BIBM, page 692-695. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Unsupervised Extractive Summarization with Facet-Aware Modeling., , , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 1685-1697. Association for Computational Linguistics, (2021)Enhancing Dialogue-based Relation Extraction by Speaker and Trigger Words Prediction., , , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 4580-4585. Association for Computational Linguistics, (2021)A Novel Derivation Framework For Definite Logic Program., , , and . FICS, volume 212 of Electronic Notes in Theoretical Computer Science, page 71-85. Elsevier, (2008)Local abstract verification and refinement of security protocols., , and . FMSE, page 21-30. ACM, (2008)An Integrated Reordering Model for Statistical Machine Translation., , and . MICAI, volume 4827 of Lecture Notes in Computer Science, page 955-965. Springer, (2007)ID Repetition in Kad., , , , and . Peer-to-Peer Computing, page 111-120. IEEE, (2009)Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China., , , , , , and . TASE, page 57-64. IEEE, (2019)An Effective Approach to Measuring and Assessing the Risk of Android Application., , and . TASE, page 31-38. IEEE Computer Society, (2015)Program Slicing Stored XSS Bugs in Web Application., , and . TASE, page 191-194. IEEE Computer Society, (2011)Constraints Solution for Time Sensitive Security Protocols., , , and . FAW, volume 4613 of Lecture Notes in Computer Science, page 191-203. Springer, (2007)