Author of the publication

A Probabilistic Model for Bursty Topic Discovery in Microblogs.

, , , , and . AAAI, page 353-359. AAAI Press, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A NEW METHOD OF SMALL-SIGNAL CALIBRATION BASED ON KALMAN FILTER, and . International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 9 (1/2): 6 (July 2019)Theoretical Lower Bound for UWB TDOA Positioning., , and . GLOBECOM, page 4101-4105. IEEE, (2007)Applying Enterprise Social Software for Knowledge Management., , and . IJKSS, 7 (4): 19-39 (2016)Cepstrum Interpolation towards Robust Speech Recognition over the Phone., and . SPPRA, page 216-221. IASTED/ACTA Press, (2006)Drug-like Index: A New Approach To Measure Drug-like Compounds and Their Diversity., and . Journal of Chemical Information and Computer Sciences, 40 (5): 1177-1187 (2000)A 0.22 pJ/step subsampling ADC with fast input-tracking sampling and simplified opamp sharing., , , , , , , and . ISCAS, page 3016-3019. IEEE, (2010)A New Attribute Reduction Algorithm Based on Classification Closeness Function., , and . ICICA (2), volume 106 of Communications in Computer and Information Science, page 523-530. Springer, (2010)The OR Data Complement Method for Incomplete Decision Tables., , and . ICICA (1), volume 105 of Communications in Computer and Information Science, page 361-367. Springer, (2010)Optimal Capacity-Delay Tradeoff in MANETs With Correlation of Node Mobility., , , , , , and . IEEE Trans. Vehicular Technology, 66 (2): 1772-1785 (2017)Cryptanalysis of Multi-Prime Φ-Hiding Assumption., , , , , and . IACR Cryptology ePrint Archive, (2016)