Author of the publication

Predicting mobile application usage using contextual information.

, , , and . UbiComp, page 1059-1065. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large capacity and high quality reversible data hiding method based on enhanced side match vector quantization., , , and . Multimedia Tools Appl., 75 (1): 71-91 (2016)A novel high-performance reversible data hiding scheme using SMVQ and improved locally adaptive coding method., , , and . J. Vis. Commun. Image Represent., 25 (2): 454-465 (2014)可公开定责的密文策略属性基加密方案 (Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme)., and . 计算机科学, 44 (5): 160-165 (2017)Research on an Urban Building Area Extraction Method with High-Resolution PolSAR Imaging Based on Adaptive Neighborhood Selection Neighborhoods for Preserving Embedding., , , and . ISPRS Int. J. Geo Inf., 9 (2): 109 (2020)Integrated Quantitative Evaluation Method of SAR Filters., , , , and . Remote. Sens., 15 (5): 1409 (March 2023)High-quality initial codebook design method of vector quantisation using grouping strategy., , , and . IET Image Processing, 9 (11): 986-992 (2015)Understanding Weight Change Behaviors through Online Social Networks., , and . Int. J. Comput. Model. Algorithms Medicine, 2 (3): 46-69 (2011)A Comprehensive Survey on Graph Anomaly Detection With Deep Learning., , , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (12): 12012-12038 (December 2023)Masked Pre-trained Model Enables Universal Zero-shot Denoiser., , , , , , , , and . CoRR, (2024)Understanding the Scalability Problem of RNIC Cache at the Micro-architecture Level., , , , and . ICC, page 6059-6065. IEEE, (2023)