Author of the publication

A synthetical approach for blog recommendation: Combining trust, social relation, and semantic analysis

, and . Expert Systems with Applications, 36 (3): 6536--6547 (April 2009)
DOI: 10.1016/j.eswa.2008.07.077

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object identification using modified distributed associated memory., and . Pattern Recognit. Lett., 13 (8): 569-579 (1992)Energy-efficient synonym data detection and consistency for virtual cache., , and . Microprocess. Microsystems, (2016)A power efficiency routing and maintenance protocol in wireless multi-hop networks., and . J. Syst. Softw., 85 (1): 62-76 (2012)An improved efficient performance design with multiple channels and bandwidth allocation strategy for mobile ad hoc networks., and . Int. J. Pervasive Comput. Commun., 4 (3): 279-298 (2008)A Low Power-Consuming Embedded System Design by Reducing Memory Access Frequencies., , and . IEICE Trans. Inf. Syst., 88-D (12): 2748-2756 (2005)A Lightweight Routing Protocol for Mobile Target Detection in Wireless Sensor Networks., , , and . IEICE Trans. Commun., 93-B (12): 3591-3599 (2010)Accelerating the least-square Monte Carlo method with parallel computing., , and . J. Supercomput., 71 (9): 3593-3608 (2015)Designing A Disjoint Paths Interconnection Network with Fault Tolerance and Collision Solving., and . J. Supercomput., 34 (1): 63-80 (2005)Top-Level Secure Certificateless Signature Scheme in the Standard Model., , and . IEEE Syst. J., 13 (3): 2763-2774 (2019)The development of an ontology-based expert system for corporate financial rating, , and . Expert Systems with Applications, 36 (2, Part 1): 2130 - 2142 (2009)