Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Text Mining, Names and Security.. J. Database Manag., 16 (1): 54-59 (2005)A combination of expert opinion approach to probabilistic information retrieval, part 2: Mathematical treatment of CEO model 3.. Inf. Process. Manage., 26 (3): 383-394 (1990)Behaviour Selection Using Neural Networks.. GAME-ON, page 165-. EUROSIS, (2003)A two-stage inference algorithm for gene regulation network models., , , and . I. J. Computational Biology and Drug Design, 9 (1/2): 6-24 (2016)System Development and Demonstration of a Cooperative UAV Team for Mapping and Tracking., , , and . I. J. Robotics Res., 29 (11): 1371-1399 (2010)TREC-3 Ad Hoc Retrieval and Routing Experiments using the WIN System., , , and . TREC, Special Publication 500-225, page 211-218. National Institute of Standards and Technology (NIST), (1994)Negated bio-events: analysis and identification., , and . BMC Bioinformatics, (2013)"Mining events from the literature for bioinformatics applications" by S. Ananiadou, P. Thompson, and R. Nawaz; with Martin Vesely as coordinator., , and . SIGWEB Newsletter, 2013 (Autumn): 5:1-5:12 (2013)Large-Scale Unsupervised Deep Representation Learning for Brain Structure., , , and . CoRR, (2018)Using text mining techniques to extract phenotypic information from the PhenoCHF corpus., , , and . BMC Med. Inf. & Decision Making, 15 (S-2): S3 (2015)