Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting recurring and similar software vulnerabilities., , , , , and . ICSE (2), page 227-230. ACM, (2010)978-1-60558-719-6.Design Cloud-Fog Systems Using Heuristic Solutions on the Energy of IoT Devices.. ICCASA, volume 409 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 219-225. Springer, (2021)Structured pointing networks for natural language understanding. Nanyang Technological University, Singapore, (2021)RST Parsing from Scratch., , , and . NAACL-HLT, page 1613-1625. Association for Computational Linguistics, (2021)Continual Relation Extraction via Sequential Multi-Task Learning., , , , and . AAAI, page 18444-18452. AAAI Press, (2024)Graph-based mining of multiple object usage patterns., , , , and . ESEC/SIGSOFT FSE, page 383-392. ACM, (2009)Heuristic Energy-Efficient Routing Solutions to Extend the Lifetime of Wireless Ad-Hoc Sensor Networks.. ACIIDS (2), volume 7197 of Lecture Notes in Computer Science, page 487-497. Springer, (2012)Sentiment search: an emerging trend on social media monitoring systems., , and . Aslib J. Inf. Manag., 66 (5): 553-580 (2014)A Two-Stage Decoder for Efficient ICD Coding., , , and . ACL (Findings), page 4658-4665. Association for Computational Linguistics, (2023)Cross-model Back-translated Distillation for Unsupervised Machine Translation., , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 8073-8083. PMLR, (2021)