Author of the publication

Mining Online Users? Access Records for Web Business Intelligence.

, and . ICDM, page 759-762. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web 2.0 Recommendation service by multi-collaborative filtering trust network algorithm., , and . Information Systems Frontiers, 15 (4): 533-551 (2013)Social Network Collaborative Filtering Framework and Online Trust Factors: a Case Study on Facebook., and . IJWA, 3 (1): 17-28 (2011)Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006., , , , and . JIPS, 8 (3): 495-520 (2012)Predicting car purchase intent using data mining approach., , and . FSKD, page 1994-1999. IEEE, (2011)Negotiation Paradigms for E-Commerce Agents using Knowledge Beads Methodology., , and . CW, page 279-287. IEEE Computer Society, (2003)Mining Online Users? Access Records for Web Business Intelligence., and . ICDM, page 759-762. IEEE Computer Society, (2002)A review of metaheuristics in robotics., , and . Computers & Electrical Engineering, (2015)Negotiation Paradigms Based on Knowledge Bead's Methodology., , and . Web Intelligence, page 694-697. IEEE Computer Society, (2003)Countering the concept-drift problems in big data by an incrementally optimized stream mining model., and . Journal of Systems and Software, (2015)Debunking the designs of contemporary nature-inspired computing algorithms: from moving particles to roaming elephants., , and . FGCT, page 1-11. IEEE, (2015)