Author of the publication

Improving Scalability of Personalized Recommendation Systems for Enterprise Knowledge Workers.

, , , , and . IEEE Access, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usable Privacy Controls for Blogs., , , and . CSE (4), page 401-408. IEEE Computer Society, (2009)Wiki Vandalysis - Wikipedia Vandalism Analysis - Lab Report for PAN at CLEF 2010., , , , and . CLEF (Notebook Papers/LABs/Workshops), volume 1176 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)PhorceField: a phish-proof password ceremony., , , , and . ACSAC, page 159-168. ACM, (2011)iTag: a personalized blog tagger., , and . RecSys, page 297-300. ACM, (2009)A Hierarchical Clustering Method in Wireless Ad Hoc Sensor Networks., , , and . ICC, page 3503-3509. IEEE, (2007)Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis., , , , and . ACL (Short Papers), page 83-88. The Association for Computer Linguistics, (2011)Predicting Cyber Threats with Virtual Security Products., , , , , and . ACSAC, page 189-199. ACM, (2017)Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators., , , , , , and . ACSAC, page 200-211. ACM, (2017)Access Prediction for Knowledge Workers in Enterprise Data Repositories., , , , and . ICEIS (1), page 150-161. SciTePress, (2015)A National Single Indicator for Schools in England: Helping Parents Make Informed Decisions., , , , , , and . KCICTP/ITEM, volume 444 of IFIP Advances in Information and Communication Technology, page 331-345. Springer, (2014)