Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of automated and human assignment of MeSH terms on publicly-available molecular datasets., , , , and . Journal of Biomedical Informatics, 44 (Supplement-1): S39-S43 (2011)On Addressing Efficiency Concerns in Privacy Preserving Data Mining, , and . CoRR, (2003)An Effective Two-Stage Model for Exploiting Non-Local Dependencies in Named Entity Recognition., and . ACL, The Association for Computer Linguistics, (2006)Short comings of latent models in supervised settings.. SIGIR, page 625-626. ACM, (2005)Web Spam Detection with Anti-Trust Rank., and . AIRWeb, page 37-40. (2006)On Addressing Efficiency Concerns in Privacy-Preserving Mining., , and . DASFAA, volume 2973 of Lecture Notes in Computer Science, page 113-124. Springer, (2004)Enhanced Answer Type Inference from Questions using Sequential Models., , and . HLT/EMNLP, page 315-322. The Association for Computational Linguistics, (2005)The impact factor of an open access journal does not contribute to an article's citations, , , , , , , , , and 2 other author(s). F1000Research, (March 2017)MACREE - A Modern Approach for Classification and Recognition of Earthquakes and Explosions., , and . ACITY (2), volume 177 of Advances in Intelligent Systems and Computing, page 49-56. Springer, (2012)