Author of the publication

Level-Based Link Analysis.

, , , , , and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 183-194. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual Learning: Theoretical Study and an Algorithmic Extension., , , , and . SN Comput. Sci., 2 (5): 413 (2021)Computer Science Diagram Understanding with Topology Parsing., , , , , , and . ACM Trans. Knowl. Discov. Data, 16 (6): 114:1-114:20 (2022)SPRoBERTa: protein embedding learning with local fragment modeling., , , , , , , , and . Briefings Bioinform., (2022)A general approximation framework for direct optimization of information retrieval measures., , and . Inf. Retr., 13 (4): 375-397 (2010)Finite budget analysis of multi-armed bandit problems., , , , , , and . Neurocomputing, (2017)Dense Information Flow for Neural Machine Translation., , , , and . NAACL-HLT, page 1294-1303. Association for Computational Linguistics, (2018)Time-Decaying Bandits for Non-stationary Systems., and . WINE, volume 8877 of Lecture Notes in Computer Science, page 460-466. Springer, (2014)An effective sequential pattern mining algorithm to support automatic process classification in contact center back office., , , , and . SOLI, page 42-47. IEEE, (2012)Pre-training Antibody Language Models for Antigen-Specific Computational Antibody Design., , , , , , , , , and 1 other author(s). KDD, page 506-517. ACM, (2023)Trust Region Evolution Strategies., , , , , , and . AAAI, page 4352-4359. AAAI Press, (2019)