Author of the publication

Personalize Review Selection Using PeRView.

, , , , and . KSEM (1), volume 11061 of Lecture Notes in Computer Science, page 238-249. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of Sensitive Items in Privacy Preserving - Association Rule Mining., and . Computer and Information Science, 1 (2): 85-89 (2008)Background Modelling using a Q-Tree Based Foreground Segmentation., and . Scalable Comput. Pract. Exp., 21 (1): 17-31 (2020)A New Approach to Sensitive Rule Hiding., , and . Computer and Information Science, 1 (3): 107-111 (2008)Sensitive Items in Privacy Preserving - Association Rule Mining., and . J. Inf. Knowl. Manag., 7 (1): 31-35 (2008)PeRView: A Framework for Personalized Review Selection Using Micro-Reviews., , , , and . CoRR, (2018)Personalize Review Selection Using PeRView., , , , and . KSEM (1), volume 11061 of Lecture Notes in Computer Science, page 238-249. Springer, (2018)Multiple Criteria Decision Analysis Based Overlapped Latent Fingerprint Recognition System Using fuzzy Sets., , and . Int. J. Fuzzy Syst., 20 (6): 2016-2042 (2018)Implementation of biometrics based security system with integrated techniques., , and . CCSEIT, page 37-42. ACM, (2012)On Two Problems in the Generation of Program Test Paths., , and . IEEE Trans. Software Eng., 2 (3): 227-231 (1976)Intelligent Tutoring System: Predicting Students Results Using Neural Networks., , and . J. Convergence Inf. Technol., 3 (3): 22-26 (2008)