Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abstract machine models and proxy architectures for exascale computing., , , , , , , , , and 8 other author(s). Co-HPC@SC, page 25-32. IEEE, (2014)Defending recommender systems: detection of profile injection attacks., , and . Service Oriented Computing and Applications, 1 (3): 157-170 (2007)The FindMe Approach to Assisted Browsing., , and . IEEE Expert, 12 (4): 32-40 (1997)Collaborative Recommendation of Informal Learning Experiences., and . WI Workshops, page 66-67. IEEE Computer Society, (2016)Hybrid tag recommendation for social annotation systems., , , and . CIKM, page 829-838. ACM, (2010)Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness., , , and . ACM Trans. Internet Techn., 7 (4): 23 (2007)Strong Approximations in Probability and Statistics.. International Encyclopedia of Statistical Science, Springer, (2011)User Partitioning Hybrid for Tag Recommendation., , and . UMAP, volume 8538 of Lecture Notes in Computer Science, page 74-85. Springer, (2014)Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks., , and . AAAI, page 1388-1393. AAAI Press, (2006)Differential Context Relaxation for Context-Aware Travel Recommendation., , and . EC-Web, volume 123 of Lecture Notes in Business Information Processing, page 88-99. Springer, (2012)