Publications in OpenAlex of which a co-author is affiliated to this organization
All publications | By field | By subfield
All publications [Next]
| Title | DOI |
|---|---|
| NovaSearch at TREC 2013 Federated Web Search Track: Experiments with rank fusion. | |
| https://doi.org/10.1145/2933418 | Booming enrollments |
| https://doi.org/10.1145/3070822 | Graph Logics with Rational Relations |
| https://doi.org/10.1145/3418077 | Programming Strategies for Irregular Algorithms on the Emu Chick |
| https://doi.org/10.1002/spe.2869 | Microservice transition and its granularity problem: A systematic mapping study |
| Skeleton Programming for Heterogeneous GPU-based Systems | |
| https://doi.org/10.1007/978-3-642-14749-4_26 | Verbally Annotated Tactile Maps – Challenges and Approaches |
| https://doi.org/10.3722/cadaps.2009.243-252 | Compound-Rhythm Log-Aesthetic Curves |
| The Unreusability of Diversified Search Test Collections | |
| ANALYZING THE DISCOURSE OF GEOGEBRA COLLABORATIONS | |
| Influencing the Others' Minds: An Experimental Evaluation of the Use and Efficacy of Fallacious-Reducible Arguments in Web and Mobile Technologies | |
| Big Data or Right Data | |
| https://doi.org/10.21437/interspeech.2013-396 | Using dialog-activity similarity for spoken information retrieval |
| https://doi.org/10.1038/bcj.2016.90 | Application Scenarios for the Learning Objects Pool |
| https://doi.org/10.1145/3368089.3409715 | TypeWriter: neural type prediction with search-based validation |
| https://doi.org/10.1126/science.adg4246 | Understanding the limits of AI coding |
| The Implementation of Face Security for Authentication Implemented on Mobile Phone | |
| Designing Affective Games with Physiological Input | |
| https://doi.org/10.21437/interspeech.2012-607 | Towards empirical dialog-state modeling and its use in language modeling |
| https://doi.org/10.1109/ismar.2015.64 | [POSTER] Improved SPAAM Robustness through Stereo Calibration |
| Semantic Web Vision: survey of ontology mapping systems and evaluation of progress | |
| Multi-objective relevance ranking | |
| Mobile IP: A Solution for Transparent, Seamless Mobile Computer Communications | |
| Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability | |
| https://doi.org/10.1145/1052883.1052888 | Checking spelling in source code |
| Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System | |
| Patterns of Importance Variation in Spoken Dialog | |
| https://doi.org/10.1145/2851502 | Examining and Reducing the Influence of Sampling Errors on Feedback-Driven Optimizations |
| https://doi.org/10.13140/rg.2.1.4066.9921 | Emrooz: A Scalable Database for SSN Observations |
| NovaSearch on Medical ImageCLEF 2013. | |
| https://doi.org/10.1145/3158344 | Developing an Open Source 'Big Data' Cognitive Computing Platform |
| https://doi.org/10.4230/lipics.rta.2011.345 | Type Preservation as a Confluence Problem |
| https://doi.org/10.7155/jgaa.00268 | Subgraph Homeomorphism via the Edge Addition Planarity Algorithm |
| News Recommendation in the Wild: CWI's Recommendation Algorithms in the NRS Challenge | |
| Technology diffusion in communication networks | |
| https://doi.org/10.14201/adcaij20154418 | Intelligent system to control electric power distribution networks |
| RESEARCH AND IMPLEMENTATION OF SECURITY FRAMEWORK FOR SMALL AND MEDIUM SIZED E-COMMERCE BASED ON SOA | |
| Using Reengineering as an Integrating Capstone Experience | |
| https://doi.org/10.18653/v1/2020.findings-emnlp.335 | Dr. Summarize: Global Summarization of Medical Dialogue by Exploiting Local Structures. |
| https://doi.org/10.1145/3466752.3480110 | Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications |
| Processing Complex Similarity Queries: A Systematic Approach. | |
| Database-Aware Program Optimization via Static Analysis. | |
| https://doi.org/10.1145/3349529 | ACM-NDC study 2018--2019 |
| https://doi.org/10.1007/s11257-021-09302-x | Improving accountability in recommender systems research through reproducibility |
| https://doi.org/10.1145/3485245 | ACM-NDC study 2020--2021 |
| Thirty-Two Sample Audio Search Tasks | |
| https://doi.org/10.1145/2405716.2405721 | A matter of taste |
| PRANK: motion Prediction based on RANKing | |
| https://doi.org/10.1145/341800.341824 | Compact, multilayer layout for butterfly fat-tree |
| https://doi.org/10.1145/321479.321484 | Queueing Analysis of the IBM 2314 Disk Storage Facility |
| https://doi.org/10.1145/52964.52975 | Computing as a discipline: preliminary report of the ACM task force on the core of computer science |
| https://doi.org/10.2312/pt.20031421 | BlobMaker: Free-Form Modelling with Variational Implicit Surfaces |
| https://doi.org/10.1504/ijcat.2005.006467 | Content-based retrieval of technical drawings |
| https://doi.org/10.1145/266021.266094 | Rapid frequency-domain analog fault simulation under parameter tolerances |
| Quorum Systems in Replicated Databases: Science or Fiction? | |
| https://doi.org/10.1002/he.36919886205 | Distributed computing |
| https://doi.org/10.1109/hcc.2001.995274 | Moses-a tool suite for visual modeling of discrete-event systems |
| https://doi.org/10.17705/1cais.01217 | The WOSP Model: Balanced Information System Design and Evaluation |
| https://doi.org/10.1590/s1984-29612019043 | Experimental evaluation of a generative probabilistic image retrieval model on 'easy' data |
| https://doi.org/10.1109/dexa.2000.875047 | POWER: programme for an ontology based working environment for modeling and use of regulations and legislation |
| Information Overload and Virtual Public Discourse Boundaries. | |
| Knowledge mapping with Compendium in academic research and online education | |
| https://doi.org/10.1145/347792.347801 | A memetic algorithm to schedule planned maintenance for the national grid |
| https://doi.org/10.5555/522344.825715 | Data dependence analysis of assembly code |
| https://doi.org/10.1080/03634529409378965 | The internet: An overview |
| https://doi.org/10.1109/ipps.1997.580868 | Fault-tolerant deadline-monotonic algorithm for scheduling hard-real-time tasks |
| Control-Flow-Graph-Based Aspect Mining | |
| An incremental formal semantics for PROMELA | |
| Is the Answer to Internet Addiction Internet Interdiction | |
| Evaluation of an Embodied Conversational Agent with Affective Behavior | |
| Knowledge grid: An architecture for distributed knowledge discovery | |
| Problem Analysis and Structure | |
| TV Scout: Guiding Users from Printed TV Program Guides to Personalized TV Recommendation | |
| ContraPolice: a libc Extension for Protecting Applications from Heap-Smashing Attacks | |
| https://doi.org/10.1007/3-540-46037-3_30 | Describing the Syntax and Semantics of UML Statecharts in a Heterogeneous Modelling Environment |
| https://doi.org/10.1145/1047671.1047688 | 20 th century vs. 21 st century C&C |
| https://doi.org/10.1075/cilt.290.16war | A prosodic feature that invites back-channels in Egyptian Arabic |
| Towards More Professional Information Systems Development: ISD as Knowledge Work. | |
| Throw and Tilt – Seamless Interaction across Devices Using Mobile Phone Gestures | |
| SQL/XML and the SQLX Informal Group of Companies. | |
| https://doi.org/10.3217/jucs-008-05-0506 | Ontology-Based Skills Management: Goals, Opportunities and Challenges |
| Supporting Model-to-Model Transformations: The VMT Approach | |
| Some Patterns of Component and Language Integration. | |
| Program Analysis: A Hierarchy | |
| Designing a Simple FPGA-Optimized RISC CPU and System-on-a-Chip | |
| Evaluating the Productivity Of Researchers and their Communities: the Rp-index and the Cp-index | |
| https://doi.org/10.1145/10590.10592 | Correctness conditions for highly available replicated databases |
| A Visual Formalism For Object-Oriented Architecture | |
| Overview of the NTCIR-8 Community QA Pilot Task (Part I): The Test Collection and the Task. | |
| Delft University at the TREC 2009 Entity Track: Ranking Wikipedia Entities | |
| A Generic Sentence Trimmer with CRFs | |
| IconStickers: Converting Computer Icons into Real Paper Icons | |
| Ubiquitous computing and cellular handset interfaces - are menus the best way forward? | |
| Databases and Natural Language Interfaces. | |
| Security Issues in Mobile Commerce Using WAP | |
| Trusting Online: Nurturing Trust in Virtual Teams | |
| Input-based Language Modelling in the Design of High Performance Text Input Techniques. | |
| https://doi.org/10.1007/978-3-540-70930-5_7 | TestML - A Test Exchange Language for Model-Based Testing of Embedded Software |
| Integrating Association Rule Mining Algorithms with Relational Database Systems. | |
| https://doi.org/10.1145/2487241.2487243 | The VPN Conjecture Is True |
