Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a Long Term Strategy for International Collaboration in Trustworthy ICT: Security, Privacy and Trust in Global Networks and Services., , , and . SysSec@DIMVA, page 90-93. IEEE, (2011)Modelling Compression with Discourse Constraints., and . EMNLP-CoNLL, page 1-11. ACL, (2007)You never call: Demoting unused contacts on mobile phones using DMTR., , , and . Personal and Ubiquitous Computing, 16 (6): 757-766 (2012)Global Inference for Sentence Compression: An Integer Linear Programming Approach., and . J. Artif. Intell. Res., (2008)Global inference for sentence compression : an integer linear programming approach.. University of Edinburgh, UK, (2008)British Library, EThOS.Trust & security RTD in the internet of things: opportunities for international cooperation., , , , and . SECURIT, page 172-178. ACM, (2012)Venation Pattern Analysis of Leaf Images., , , , , , and . ISVC (2), volume 4292 of Lecture Notes in Computer Science, page 427-436. Springer, (2006)3-540-48628-3.Reading to Learn: Constructing Features from Semantic Abstracts., , , and . EMNLP, page 958-967. ACL, (2009)Revisiting Optimal Decoding for Machine Translation IBM Model 4., and . HLT-NAACL (Short Papers), page 5-8. The Association for Computational Linguistics, (2009)Driving Semantic Parsing from the World's Response., , , and . CoNLL, page 18-27. ACL, (2010)