Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A consensus based approach to constrained clustering of software requirements., , and . CIKM, page 1073-1082. ACM, (2008)Workshop on recommender systems and the social web., , , , , , and . RecSys, page 421-422. ACM, (2009)Magma: An Agent Based Virtual Market for Electronic Commerce., , , and . Applied Artificial Intelligence, 11 (6): 501-523 (1997)Task-Oriented Web User Modeling for Recommendation., , and . User Modeling, volume 3538 of Lecture Notes in Computer Science, page 109-118. Springer, (2005)Recommendation Systems in Requirements Discovery., , , and . Recommendation Systems in Software Engineering, Springer, (2014)Power of the Few: Analyzing the Impact of Influential Users in Collaborative Recommender Systems., , and . UMAP, page 225-233. ACM, (2019)Flatter is better: Percentile Transformations for Recommender Systems., , and . CoRR, (2019)Defending recommender systems: detection of profile injection attacks., , and . Serv. Oriented Comput. Appl., 1 (3): 157-170 (2007)Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness., , , and . ACM Trans. Internet Techn., 7 (4): 23 (2007)User Partitioning Hybrid for Tag Recommendation., , and . UMAP, volume 8538 of Lecture Notes in Computer Science, page 74-85. Springer, (2014)