Author of the publication

Query Morphing: A Proximity-Based Approach for Data Exploration and Query Reformulation.

, and . MIKE, volume 10682 of Lecture Notes in Computer Science, page 261-273. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic synchronization of circadian rhythms., , and . J. Systems Science & Complexity, 23 (5): 978-988 (2010)Indian Institute of Technology-Patna: Sentiment Analysis in Twitter., , and . SemEval@COLING, page 341-345. The Association for Computer Linguistics, (2014)Analysis of resonance based Wireless Power Transmission using circuit theory approach., , and . ICACCI, page 1794-1797. IEEE, (2014)A 3-14 GHz, Self-Body Biased Common-Gate UWB LNA for Wireless Applications in 90 nm CMOS., , and . Journal of Circuits, Systems, and Computers, 28 (4): 1950056:1-1950056:21 (2019)Improving Result Diversity Using Query Term Proximity in Exploratory Search., and . BDA, volume 11932 of Lecture Notes in Computer Science, page 67-87. Springer, (2019)An overview of user-interactions in exploratory search: theoretical foundations, techniques, and research issues.. Int. J. Bus. Inf. Syst., 38 (4): 561-583 (2021)Extracting Emotion Quotient of Viral Information Over Twitter., , and . ICDCIT, volume 13145 of Lecture Notes in Computer Science, page 210-226. Springer, (2022)Distributed Query Processing Plans generation using Teacher Learner Based Optimization., and . CoRR, (2016)Provable Security Proofs and their Interpretation in the Real World.. IACR Cryptology ePrint Archive, (2013)A Practical Key Exchange for the Internet using Lattice Cryptography.. IACR Cryptology ePrint Archive, (2015)