Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incorporating Multi-partite Networks and Expertise to Construct Related-Term Graphs., , , , and . ICDM Workshops, page 535-542. IEEE Computer Society, (2010)Non-Negative Residual Matrix Factorization with Application to Graph Anomaly Detection., and . SDM, page 143-153. SIAM / Omnipress, (2011)Cross-Modality Automatic Face Model Training from Large Video Databases., , and . CVPR Workshops, page 91. IEEE Computer Society, (2004)Discovery and Fusion of Salient Multi-modal Features Towards News Story Segmentation., , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2003)A Survey on Social Media Anomaly Detection., , , , and . SIGKDD Explor., 18 (1): 1-14 (2016)Towards Evolutionary Nonnegative Matrix Factorization., , and . AAAI, page 501-506. AAAI Press, (2011)Improved text overlay detection in videos using a fusion-based classifier., , , and . ICME, page 473-476. IEEE Computer Society, (2003)Towards Finding Valuable Topics., and . SDM, page 720-731. SIAM, (2010)Exploiting Synchronicity Networks for Finding Valuables in Heterogeneous Networks., and . SDM, page 369-377. SIAM, (2013)Collaborating Globally: Culture and Organizational Computer-Mediated Communications., , , , and . ICIS, Association for Information Systems, (2011)