Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS Deviation Distance Based Negotiation Algorithm in Grid Resource Advance Reservation., , , and . CSCWD, page 605-610. IEEE, (2007)Identifying Spam in Reviews., , , and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Popular Items or Niche Items: Flexible Recommendation Using Cosine Patterns., , , , and . ICDM Workshops, page 205-212. IEEE Computer Society, (2014)A Replica Replacement Algorithm Based on Value-Cost Prediction., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 365-373. Springer, (2007)SEA: a system for event analysis on chinese tweets., , , , , and . KDD, page 1498-1501. ACM, (2013)Towards a Tricksy Group Shilling Attack Model against Recommender Systems., , , and . ADMA, volume 7713 of Lecture Notes in Computer Science, page 675-688. Springer, (2012)HirePool: Optimizing Resource Reuse Based on a Hybrid Resource Pool in the Cloud., , , , and . IEEE Access, (2018)Efficient batch similarity join processing of social images based on arbitrary features., , , , and . World Wide Web, 19 (4): 725-753 (2016)Parallelizing K-Means-Based Clustering on Spark., , , , and . CBD, page 31-36. IEEE, (2016)Detecting Genuine Communities from Large-Scale Social Networks: A Pattern-Based Method., , , , and . Comput. J., 57 (9): 1343-1357 (2014)