Author of the publication

A Location and Intention Oriented Recommendation Method for Accuracy Enhancement over Big Data.

, , , , , and . MobiCASE, volume 290 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-17. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survivable Cloud Network Design Against Multiple Failures Through Protecting Spanning Trees., , and . CoRR, (2016)Survivable Probability of Network Slicing with Random Physical Link Failure., and . CoRR, (2017)An Invocation Cost Optimization Method for Web Services in Cloud Environment., , and . Sci. Program., (2017)A solution for cyclic scheduling of multi-hoists without overlapping., and . Ann. Oper. Res., 168 (1): 5-21 (2009)Lagrangean relaxation and hybrid simulated annealing tabu search procedure for a two-echelon capacitated facility location problem with plant size selection., , , , and . Int. J. Prod. Res., 55 (9): 2540-2555 (2017)Secret Image Sharing Based on Encrypted Pixels., , , and . IEEE Access, (2018)GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems., , , , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 2779-2790 (September 2023)Dynamic Marketing Resource Allocation with Two-Stage Decisions., , , and . J. Theor. Appl. Electron. Commer. Res., 17 (1): 327-344 (2022)Two heuristics for the capacitated multi-period cutting stock problem with pattern setup cost., , and . Comput. Oper. Res., (2019)Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat., , , , and . CyberC, page 81-89. IEEE, (2019)