Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Phishing, , , and . Communications of the ACM, 50 (10): 94--100 (October 2007)Is Agent-based Online Search Feasible?. Spring Symposium on Intelligent Agents in Cyberspace, AAAI Press, (1999)Lexical and Semantic Clustering by Web Links. Journal of the American Society for Information Science and Technology, 55 (14): 1261--1269 (2004)Customer Targeting: A Neural Network Approach Guided by Genetic Algorithms, , , and . Management Science, 51 (2): 264--276 (2005)Visual comparison of search results: A censorship case study, and . First Monday, (July 2008)Approximating PageRank from in-degree, , , and . Proc. WAW 2006, volume 4936 of LNCS, Springer, (2008)Adaptive Assistants for Customized E-Shopping, , and . IEEE Intelligent Systems, 17 (6): 12--19 (2002)Evidence of Hyperplanes in the Genetic Learning of Neural Networks, and . Biological Cybernetics, (1992)MySpiders: Evolve your own intelligent Web crawlers, and . Autonomous Agents and Multi-Agent Systems, 5 (2): 221--229 (2002)Algorithmic computation and approximation of semantic similarity, , , , and . 14th International World Wide Web Conference (WWW2005), page 431--456. Chiba, JAPAN, (2005)