Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling Periodic Continuous Queries in Real-Time Data Broadcast Environments., , and . IEEE Trans. Computers, 61 (9): 1325-1340 (2012)Detection of Shilling Attack Based on T-distribution on the Dynamic Time Intervals in Recommendation Systems., , , , and . CoRR, (2019)An Updates Dissemination Protocol for Read-Only Transaction Processing in Mobile Real-Time Computing Environments., , , , and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 217-228. Springer, (2005)Bayesian Classifier Modeling for Dirty Data., , , , and . PRICAI (3), volume 11672 of Lecture Notes in Computer Science, page 66-79. Springer, (2019)A Novel Secure Access Method for Remote Databases Based on Mobile Agents., , and . ICNC (5), page 519-522. IEEE Computer Society, (2009)A Hybrid Efficient Short-term Traffic Flow Forecast Technology., , , and . FSKD (1), page 371-374. IEEE Computer Society, (2009)A Novel Kalman Filter Based Shilling Attack Detection Algorithm., , , , and . CoRR, (2019)An Information Update Method Towards Internal Search Engine., , , , , and . IEEE WISA, page 211-216. IEEE Computer Society, (2015)Searching Desktop Files Based on Access Logs., , , and . DASFAA (2), page 267-274. Springer, (2013)ENRS: An Effective Recommender System Using Bayesian Model., , , , and . DASFAA (2), volume 9050 of Lecture Notes in Computer Science, page 531-535. Springer, (2015)