Author of the publication

Exploiting two-faceted web of trust for enhanced-quality recommendations.

, , , and . Expert Syst. Appl., 40 (17): 7080-7095 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Examination on Service Science: A View from e-Service., and . ISD, page 187-195. Springer, (2008)A Hybrid Movie Recommendation Approach via Social Tags., , , and . ICEBE, page 280-285. IEEE Computer Society, (2014)Trust Based Service Selection in Service Oriented Environment., , , and . Int. J. Web Service Res., 9 (3): 23-42 (2012)An Investigation on Interdisciplinary Structure of Service Science., and . SERVICES I, page 247-248. IEEE Computer Society, (2008)Making Recommendations on Microblogs through Topic Modeling., , , and . WISE Workshops, volume 8182 of Lecture Notes in Computer Science, page 252-265. Springer, (2013)Performance-Driven Task and Data Co-scheduling Algorithms for Data-Intensive Applications in Grid Computing., , , and . APWeb, volume 3007 of Lecture Notes in Computer Science, page 331-340. Springer, (2004)A Semantic Web Approach to "Request for Quote" in E-Commerce., , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 885-888. Springer, (2006)Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card., and . JNW, 5 (12): 1434-1441 (2010)A Comprehensive RMS Model for P2P e-Commerce Communities., , , and . IAT Workshops, page 320-323. IEEE Computer Society, (2006)Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme., , , and . INCoS, page 360-364. IEEE, (2012)