From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Support Vector Machines for Terrorism Information Extraction., , , и . ISI, том 2665 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2003)JPLink: On Linking Jobs to Vocational Interest Types., , и . PAKDD (2), том 12085 из Lecture Notes in Computer Science, стр. 220-232. Springer, (2020)Do You Trust to Get Trust? A Study of Trust Reciprocity Behaviors and Reciprocal Trust Prediction., , , , и . SDM, стр. 72-83. SIAM, (2010)Editorial., , и . Soc. Netw. Anal. Min., 3 (4): 785 (2013)A Support-Ordered Trie for Fast Frequent Itemset Discovery., , и . IEEE Trans. Knowl. Data Eng., 16 (7): 875-879 (2004)Causal Interventional Training for Image Recognition., , , , и . IEEE Trans. Multim., (2023)Collective Rumor correction on the Death Hoax., , , и . PACIS, стр. 178. (2016)In-Network Processing of Nearest Neighbor Queries for Wireless Sensor Networks., , и . DASFAA, том 3882 из Lecture Notes in Computer Science, стр. 35-49. Springer, (2006)A Heuristic Method for Correlating Attribute Group Pairs in Data Mining., , и . ER Workshops, том 1552 из Lecture Notes in Computer Science, стр. 29-40. Springer, (1998)A Global Object Model for Accommodating Instance Heterogeneities., и . ER, том 1507 из Lecture Notes in Computer Science, стр. 435-448. Springer, (1998)