Author of the publication

Personalizing Peloton: Combining Rankers and Filters To Balance Engagement and Business Goals.

, , , and . RecSys, page 575-576. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Graph Mining with GPUs., , , and . BigMine, volume 36 of JMLR Workshop and Conference Proceedings, page 1-16. JMLR.org, (2014)A multi-level approach for evaluating internet topology generators., , and . Networking, page 1-9. IEEE Computer Society, (2013)FPCS: A Formal Approach for Privacy-Aware Context-Based Services., and . COMPSAC, page 432-439. IEEE Computer Society, (2008)Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments., , , , and . J. Syst. Softw., 83 (2): 253-270 (2010)Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment., , and . MobiQuitous, page 1-6. IEEE Computer Society, (2007)WiFi Radar: Design and Implementation of an Infrastructure-less Location Tracking System for Pervasive Environment., , and . COMPSAC, page 335-338. IEEE Computer Society, (2008)Service sharing with trust in pervasive environment: now it's time to break the jinx., , and . SAC, page 1622-1628. ACM, (2008)Preventing multi-query attack in location-based services., and . WISEC, page 25-36. ACM, (2010)A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment., , and . Telecommun. Syst., 44 (3-4): 221-240 (2010)Parallel subgraph mining on hybrid platforms : HPC systems, multi-cores and GPUs.. Rensselaer Polytechnic Institute, USA, (2016)