Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining coherent dense subgraphs across massive biological networks for functional discovery., , , , and . ISMB (Supplement of Bioinformatics), page 213-221. (2005)CloSpan: Mining Closed Sequential Patterns in Large Datasets., , and . SDM, page 166-177. SIAM, (2003)Generative models for ticket resolution in expert networks., , , , , and . KDD, page 733-742. ACM, (2010)Mining coherent dense subgraphs across massive biological networks for functional discovery., , , , and . ISMB (Supplement of Bioinformatics), page 213-221. (2005)On effective presentation of graph patterns: a structural representative approach., , , and . CIKM, page 299-308. ACM, (2008)Frequent trajectory mining on GPS data., , , and . LocWeb, page 3. ACM, (2010)Forecasting Earnings Surprises from Conference Call Transcripts., , and . ACL (Findings), page 8197-8209. Association for Computational Linguistics, (2023)Controllable Dialogue Simulation with In-context Learning., , , , , and . EMNLP (Findings), page 4330-4347. Association for Computational Linguistics, (2022)Improving Medical Predictions by Irregular Multimodal Electronic Health Records Modeling., , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 41300-41313. PMLR, (2023)Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors., , , , and . IEEE Symposium on Security and Privacy, page 45-60. IEEE Computer Society, (2010)