

Author: Loftsson Hrafn
Publisher: Springer Publishing Company
ISSN: 1574-020X
Source: Language Resources and Evaluation, Vol.40, Iss.2, 2006-05, pp. : 175-181
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content


Hacker Taggers: A new type of hackers
By Warren Matthew Leitch Shona
Information Systems Frontiers, Vol. 12, Iss. 4, 2010-09 ,pp. :






Assembly Automation, Vol. 20, Iss. 1, 2000-01 ,pp. :


Building an effective tagging interface
Journal of Digital Media Management, Vol. 3, Iss. 1, 2014-08 ,pp. :