Author of the publication

Exploiting trustors as well as trustees in trust-based recommendation.

, , , and . CIKM, page 1893-1896. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient recommendation methods using category experts for a large dataset., , , , and . Inf. Fusion, (2016)Exploiting trustors as well as trustees in trust-based recommendation., , , and . CIKM, page 1893-1896. ACM, (2013)On using category experts for improving the performance and accuracy in recommender systems., , , and . CIKM, page 2355-2358. ACM, (2012)Residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series., , , , , and . SAC, page 87-96. ACM, (2022)l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items., , , , , and . IEEE Trans. Knowl. Data Eng., 31 (1): 3-16 (2019)"Do you know existing accuracy metrics overrate time-series anomaly detections?"., , , and . SAC, page 403-412. ACM, (2022)Yet another paper ranking algorithm advocating recent publications., , , and . WWW, page 1117-1118. ACM, (2010)On computing text-based similarity in scientific literature., , , and . WWW (Companion Volume), page 169-170. ACM, (2011)Decoding Single Molecule Time Traces with Dynamic Disorder., , , and . PLoS Comput. Biol., (2016)A method for recommending the latest news articles via MinHash and LSH., , and . IMCOM, page 60:1-60:6. ACM, (2015)