Author of the publication

Understanding the Lifestyle of Older Population: Mobile Crowdsensing Approach.

, , , , , , , , and . IEEE Trans. Comput. Social Systems, 6 (1): 82-95 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nayak, Richi
add a person with the name Nayak, Richi
 

Other publications of authors with the same name

A knowledge retrieval model using ontology mining and user profiling., , and . Integrated Computer-Aided Engineering, 15 (4): 313-329 (2008)A Web data extraction approach to harvesting data from online sources., and . AMT, volume 138 of Frontiers in Artificial Intelligence and Applications, page 323-326. IOS Press, (2006)Data Mining and XML Documents., , and . International Conference on Internet Computing, page 660-666. (2002)Data Mining in Conceptualising Active Ageing., , and . AusDM, volume 61 of CRPIT, page 39-45. Australian Computer Society, (2006)How Relevant is the Irrelevant Data: Leveraging the Tagging Data for a Learning-to-Rank Model., and . WSDM, page 23-32. ACM, (2016)Do-Rank: DCG Optimization for Learning-to-Rank in Tag-Based Item Recommendation Systems., and . PAKDD (2), volume 9078 of Lecture Notes in Computer Science, page 510-521. Springer, (2015)Two-way Recommendation Methods for Social Networks.. PIKM@CIKM, page 33-34. ACM, (2014)Finding Within-Organisation Spatial Information on the Web., , , and . Australasian Conference on Artificial Intelligence, volume 9457 of Lecture Notes in Computer Science, page 242-248. Springer, (2015)A Reciprocal Collaborative Method Using Relevance Feedback and Feature Importance., and . Web Intelligence, page 133-138. IEEE Computer Society, (2013)A Novel Database Exploitation Detection and Privilege Control System Using Data Mining., and . ACIIDS (Extended Posters), volume 769 of Studies in Computational Intelligence, page 505-516. Springer, (2018)