From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange., , и . PACIS, стр. 118. AISeL, (2004)Leveraging high-level and low-level features for multimedia event detection., , и . ACM Multimedia, стр. 449-458. ACM, (2012)A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch., , , , , и . ICWSM, The AAAI Press, (2012)A hybrid phish detection approach by identity discovery and keywords retrieval., и . WWW, стр. 571-580. ACM, (2009)Clever clustering vs. simple speed-up for summarizing rushes., , , , , , и . TVS, стр. 20-24. ACM, (2007)Sparse Multi-Task Learning for Detecting Influential Nodes in an Implicit Diffusion Network., , и . AAAI, стр. 926-932. AAAI Press, (2013)Correlating Alerts with a Data Mining Based Approach., , и . EEE, стр. 341-346. IEEE Computer Society, (2005)Summarizing BBC Rushes the Informedia Way., , , , , , и . TRECVID, National Institute of Standards and Technology (NIST), (2007)Reputation-Aware Contract-Supervised Grid Computing., , , и . GCC Workshops, том 3252 из Lecture Notes in Computer Science, стр. 44-51. Springer, (2004)Extracting Events with Informal Temporal References in Personal Histories in Online Communities., , , , и . ACL (2), стр. 836-842. The Association for Computer Linguistics, (2013)