Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Focused ranking in a vertical search engine., and . SIGIR, page 912. ACM, (2007)Towards the Theory of Relaxed Unification., , and . ISMIS, volume 2871 of Lecture Notes in Computer Science, page 397-401. Springer, (2003)Combating Spamdexing: Incorporating Heuristics in Link-Based Ranking., and . WAW, volume 4936 of Lecture Notes in Computer Science, page 97-106. Springer, (2006)DalTREC 2006 QA System Jellyfish: Regular Expressions Mark-and-Match Approach to Question Answering., , and . TREC, volume 500-272 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2006)Relaxed unification--Proposal., and . Appl. Math. Lett., 16 (5): 747-751 (2003)A Probabilistic Evaluation Function for Relaxed Unification., , and . COMPSAC (2), page 35-36. IEEE Computer Society, (2005)0-7695-2413-3.Detection of New Malicious Code Using N-grams Signatures., , , and . PST, page 193-196. (2004)DalTREC 2005 QA System Jellyfish: Mark-and-Match Approach to Question Answering., , , , and . TREC, volume 500-266 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2005)Relaxed Unification - Proposal., and . AI, volume 2338 of Lecture Notes in Computer Science, page 364-365. Springer, (2002)N-Gram-Based Detection of New Malicious Code., , , and . COMPSAC Workshops, page 41-42. IEEE Computer Society, (2004)0-7695-2209-2.