Author of the publication

An Effective Web Service Ranking Method via Exploring User Behavior.

, , , , and . IEEE Trans. Netw. Serv. Manag., 12 (4): 554-564 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of correlation characteristics between financial time series based on multi-resolution analysis., , , , and . Adv. Eng. Informatics, (2019)Inferring your expertise from Twitter: combining multiple types of user activity., , and . WI, page 589-598. ACM, (2017)Story Forest: Extracting Events and Telling Stories from Breaking News., , , , , and . ACM Trans. Knowl. Discov. Data, 14 (3): 31:1-31:28 (2020)Database support for solid modeling., , , and . Vis. Comput., 2 (6): 358-366 (1986)A Process Migration Oriented Multi-Shop Integrated Scheduling Algorithm for Double Objectives., , , and . Int. J. Cooperative Inf. Syst., 29 (01n02): 2040008:1-2040008:18 (2020)Ensemble learning based on approximate reducts and bootstrap sampling., , , , , and . Inf. Sci., (2021)A Privacy-Preserving Electricity Trading Scheme Based on Blockchain., , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 599-611. Springer, (2019)An Effective Memetic Algorithm for the Distributed Integrated Scheduling of Tree-Structured Products., , , and . Int. J. Cooperative Inf. Syst., 30 (1-4): 2150001:1-2150001:24 (2021)The Recognition Method of MQAM Signals Based on BP Neural Network and Bird Swarm Algorithm., , , and . IEEE Access, (2021)AF Relaying Secrecy Performance Prediction for 6G Mobile Communication Networks in Industry 5.0., , , , , and . IEEE Trans. Ind. Informatics, 18 (8): 5485-5493 (2022)