Author of the publication

Network-Constrained Tensor Factorization for Personal Recommendation in an Enterprise Network.

, , , , , and . CSCWD, page 207-212. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mechanism of Modeling and Verification for SaaS Customization Based on TLA., , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 337-344. Springer, (2009)A Confidentiality-Guarantee Mechanism for SaaS., , , and . IWEI, volume 122 of Lecture Notes in Business Information Processing, page 71-80. Springer, (2012)Automatic Composition of Web Services Based on Task Dependency Specification., , , , and . J. Comput. Res. Dev., 43 (12): 2110-2116 (2006)A Method to Select the Optimum Web Services., , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 868-873. Springer, (2006)TDWF: A Workflow Model Based on Cooperation of Web Services., , and . CSCWD, page 740-745. IEEE, (2006)Discrete Multi-view Hashing for Effective Image Retrieval., , and . ICMR, page 175-183. ACM, (2017)A Privacy Protection Evaluation Mechanism for Dynamic Data Based on Chunk-Confusion., , , and . J. Signal Process. Syst., 89 (1): 27-39 (2017)TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline., , , , , and . SPAC, page 14-19. IEEE, (2018)Guided node graph convolutional networks for repository recommendation., , , , , and . Intell. Data Anal., 27 (1): 181-198 (2023)A Sub Chunk-Confusion Based Privacy Protection Mechanism for Association Rules in Cloud Services., , , and . International Journal of Software Engineering and Knowledge Engineering, 26 (4): 539-562 (2016)