Author of the publication

Book Recommendation Based on Book-Loan Logs.

, , , , , and . ICADL, volume 7634 of Lecture Notes in Computer Science, page 269-278. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Data Mining from Multicore to Cloudy Grids., , , , and . High Performance Computing Workshop, volume 18 of Advances in Parallel Computing, page 311-340. IOS Press, (2008)Sequential Fault Diagnosis Using an Inertial Velocity Differential Evolution Algorithm., , and . Int. J. Autom. Comput., 16 (3): 389-397 (2019)Book Recommendation Based on Book-Loan Logs., , , , , and . ICADL, volume 7634 of Lecture Notes in Computer Science, page 269-278. Springer, (2012)SALSA Project: Parallel Data Mining of GIS, Web, Medical, Physics, Chemical, and Biology Data., , , , , and . eScience, page 335-336. IEEE Computer Society, (2008)Impact of Social Interaction on the Capacity of Hybrid Wireless Networks., , , and . IEEE Access, (2018)Grid services for earthquake science., , , , , , , , , and 6 other author(s). Concurr. Comput. Pract. Exp., 14 (6-7): 371-393 (2002)Biomedical Case Studies in Data Intensive Computing., , , , , , , , , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 2-18. Springer, (2009)Parallel Data Mining on Multicore Clusters., , , , , and . GCC, page 41-49. IEEE Computer Society, (2008)Cloud technologies for bioinformatics applications., , , , , , and . SC-MTAGS, ACM, (2009)Secrecy Control of Wireless Networks with Finite Encoding Blocklength., , , , and . Algorithms, 12 (2): 49 (2019)