Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bandits with Generalized Linear Models., , , , and . ICML On-line Trading of Exploration and Exploitation, volume 26 of JMLR Proceedings, page 19-36. JMLR.org, (2012)Bug characteristics in open source software., , , , , and . Empirical Software Engineering, 19 (6): 1665-1705 (2014)CWS: a comparative web search system., , , , and . WWW, page 467-476. ACM, (2006)Mining clickthrough data for collaborative web search., , , , and . WWW, page 947-948. ACM, (2006)Accurate language model estimation with document expansion., , , and . CIKM, page 273-274. ACM, (2005)Have things changed now?: an empirical study of bug characteristics in modern open source software., , , , , and . ASID, page 25-33. ACM, (2006)DirichletRank: Solving the zero-one gap problem of PageRank., , , , and . ACM Trans. Inf. Syst., 26 (2): 10:1-10:29 (2008)CBC: Clustering Based Text Classification Requiring Minimal Labeled Data., , , , and . ICDM, page 443-450. IEEE Computer Society, (2003)Mining correlated bursty topic patterns from coordinated text streams., , , and . KDD, page 784-793. ACM, (2007)Learning to Rank in Theory and Practice: From Gradient Boosting to Neural Networks and Unbiased Learning., , , , , , , , and . SIGIR, page 1419-1420. ACM, (2019)