Author of the publication

TRM: Computing Reputation Score by Mining Reviews.

, , , , , and . AAAI Workshop: Incentives and Trust in Electronic Communities, volume WS-16-09 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multi-attribute rating based trust model: improving the personalized trust modeling framework., , , , , , , , and . Multim. Tools Appl., 76 (4): 5833-5849 (2017)PEM4RFID: Privacy Enhancement Model for RFID Systems., , , , , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 682-694. Springer, (2015)HyCPK: Securing Identity Authentication in Ubiquitous Computing., , , , , and . UIC/ATC/ScalCom, page 239-246. IEEE Computer Society, (2015)TRM: Computing Reputation Score by Mining Reviews., , , , , and . AAAI Workshop: Incentives and Trust in Electronic Communities, volume WS-16-09 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Towards Trustworthy Participants in Social Participatory Networks., , , , , , and . CSCloud, page 194-199. IEEE Computer Society, (2015)