Author of the publication

A knowledge-based approach to the design of document-based retrieval systems.

, and . COCS, page 281-290. ACM, (1990)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Senior Scholars' Forum., , , , , and . ICIS, Association for Information Systems, (2011)Semantic indexing and searching using a Hopfield net., , and . J. Inf. Sci., 24 (1): 3-18 (1998)A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study., , and . J. Comput. Mediat. Commun., 16 (1): 48-70 (2010)Sports knowledge management and data mining., , and . Annu. Rev. Inf. Sci. Technol., 44 (1): 115-157 (2010)Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)., , and . ACM Trans. Priv. Secur., 23 (4): 21:1-21:33 (2020)Intelligence and security informatics for homeland security: information, communication, and transportation., , and . IEEE Trans. Intell. Transp. Syst., 5 (4): 329-341 (2004)Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement., , and . ISI, page 7-12. IEEE, (2008)Affect Intensity Analysis of Dark Web Forums., and . ISI, page 282-288. IEEE, (2007)Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing., , , , , and . IEEE Expert, 9 (6): 21-27 (1994)Identifying top listers in Alphabay using Latent Dirichlet Allocation., , , , and . ISI, page 219. IEEE, (2016)