Author of the publication

Qanda and the Catalyst Architecture.

, , , , , , and . TREC, Special Publication 500-250, National Institute of Standards and Technology (NIST), (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elder mistreatment and social network composition: an exploratory study., , , and . Social Networks, (2019)Qanda and the Catalyst Architecture., , , , , , and . TREC, Special Publication 500-250, National Institute of Standards and Technology (NIST), (2001)Modularizing Contexted Constraints.. COLING, page 448-453. (1996)Projected subset least squares for robust linear prediction of speech., , and . ICPR (3), page 6-10. IEEE, (1994)Highlights from 12 Months of Blogs., , and . AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs, page 30-33. AAAI, (2006)Integrated Feasibility Experiment for Bio-Security: IFE-Bio, A TIDES Demonstration., , , , , , , , , and 9 other author(s). HLT, Morgan Kaufmann, (2001)GeoNode: An End-to-End System from Research Components., , and . ICDE Demo Sessions, page 12-14. (2001)Exploring the Adoption, Utility, and Social Influences of Social Bookmarking in a Corporate Environment., , , , and . HICSS, page 86. IEEE Computer Society, (2007)Archive, the Foundation of Knowledge Management.. IKE, page 327-331. CSREA Press, (2004)An Intrinsically Addressed Processing System.. IBM Systems Journal, 2 (3): 182-199 (1963)