Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining concept maps from news stories for measuring civic scientific literacy in media., , , and . Computers & Education, 55 (1): 165-177 (2010)The NTNU System at SemEval-2017 Task 10: Extracting Keyphrases and Relations from Scientific Publications Using Multiple Conditional Random Fields., , and . SemEval@ACL, page 951-955. Association for Computational Linguistics, (2017)中英文專利文書之文句對列 (Sentence alignment of English and Chinese patent documents) In Chinese., , and . ROCLING, Association for Computational Linguistics and Chinese Language Processing (ACLCLP), Taiwan, (2009)文件自我擴展於自動分類之應用 (Application of Document Self-Expansion to Text Categorization) In Chinese., and . ROCLING, Association for Computational Linguistics and Chinese Language Processing (ACLCLP), Taiwan, (2003)Chinese Open Relation Extraction for Knowledge Acquisition., , , , , , , and . EACL, page 12-16. The Association for Computer Linguistics, (2014)Patent surrogate extraction and evaluation in the context of patent mapping., , , , and . J. Inf. Sci., 33 (6): 718-736 (2007)Journal clustering of library and information science for subfield delineation using the bibliometric analysis toolkit: CATAR., and . Scientometrics, 95 (2): 503-528 (2013)Mining browsing behaviors for objectionable content filtering., , , , and . J. Assoc. Inf. Sci. Technol., 66 (5): 930-942 (2015)Building a TOCFL Learner Corpus for Chinese Grammatical Error Diagnosis., , and . LREC, European Language Resources Association (ELRA), (2018)POSTER: Proactive Blacklist Update for Anti-Phishing., , , and . ACM Conference on Computer and Communications Security, page 1448-1450. ACM, (2014)