Author of the publication

Understanding item consumption orders for right-order next-item recommendation.

, , and . Knowl. Inf. Syst., 57 (1): 55-78 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A workflow net similarity measure based on transition adjacency relations., , , , and . Computers in Industry, 61 (5): 463-471 (2010)Member promotion in social networks via skyline., and . World Wide Web, 17 (4): 457-492 (2014)Multimedia Applications and Security in MapReduce: Opportunities and Challenges., , , , , and . Concurrency and Computation: Practice and Experience, 24 (17): 2083-2101 (2012)A Watermark-Aware Trusted Running Environment for Software Clouds., , , , and . ChinaGrid, page 144-151. IEEE Computer Society, (2010)Ripple: A publish/subscribe service for multidata item updates propagation in the cloud., , and . J. Network and Computer Applications, 34 (4): 1054-1067 (2011)Approximate Holistic Aggregation in Wireless Sensor Networks., , , , , and . TOSN, 13 (2): 11:1-11:24 (2017)Recommendation for Repeat Consumption from User Implicit Feedback., , , and . IEEE Trans. Knowl. Data Eng., 28 (11): 3083-3097 (2016)Understanding item consumption orders for right-order next-item recommendation., , and . Knowl. Inf. Syst., 57 (1): 55-78 (2018)A Software Watermark Based Architecture for Cloud Security., , , , and . APWeb, volume 7235 of Lecture Notes in Computer Science, page 270-281. Springer, (2012)Cell Abstract Indices for Content-Based Approximate Query Processing in Structured Peer-to-Peer Data Systems., , and . APWeb, volume 3007 of Lecture Notes in Computer Science, page 269-278. Springer, (2004)