Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overview of the NTCIR-12 IMine-2 Task., , , , , , , , and . NTCIR, National Institute of Informatics (NII), (2016)A Framework for Image Dark Data Assessment., , , , , , and . APWeb/WAIM (1), volume 11641 of Lecture Notes in Computer Science, page 3-18. Springer, (2019)Self-supervised Label-Visual Correlation Hashing for Multi-label Image Retrieval., , , , and . APWeb/WAIM (2), volume 13422 of Lecture Notes in Computer Science, page 129-143. Springer, (2022)Knowledge-Grounded Dialogue Generation with Term-level De-noising., , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 2972-2983. Association for Computational Linguistics, (2021)Tier-Scrubbing: An Adaptive and Tiered Disk Scrubbing Scheme with Improved MTTD and Reduced Cost., , , , , , , and . DAC, page 1-6. IEEE, (2020)DBA: A Dynamic Bloom Filter Array for Scalable Membership Representation of Variable Large Data Sets., , , and . MASCOTS, page 466-468. IEEE Computer Society, (2011)DSFS: Decentralized security for large parallel file systems., , , , , , , and . GRID, page 209-216. IEEE Computer Society, (2010)Implementing and Evaluating Security Controls for an Object-Based Storage System., , , , , , , and . MSST, page 87-99. IEEE Computer Society, (2007)MAD2: A scalable high-throughput exact deduplication approach for network backup services., , , and . MSST, page 1-14. IEEE Computer Society, (2010)Learn What Is Possible, Then Choose What Is Best: Disentangling One-To-Many Relations in Language Through Text-based Games., and . EMNLP (Findings), page 4955-4965. Association for Computational Linguistics, (2022)