Author of the publication

Predictive Analysis by Leveraging Temporal User Behavior and User Embeddings.

, , , , , , and . CIKM, page 2175-2182. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Factories and Dynamic Core Competency: a Case Study of Advanced semiconductor Engineering.. PACIS, page 251. AISeL, (2008)Measuring Patients' Perceptions and Social Influence on Home Telecare Management System Acceptance., and . IJHISI, 5 (3): 44-68 (2010)A real-world online signature verification system based on correlation algorithm., , and . Int. J. Comput. Appl. Technol., 58 (4): 321-339 (2018)Multi Barcode Scanning and Decoding Technology Based on AR Smart Glasses., and . J. Inf. Hiding Multim. Signal Process., 12 (4): 226-238 (2021)Figure Captioning with Reasoning and Sequence-Level Training., , , , , , , and . CoRR, (2019)Applying Statistical Modeling to Predict Basketball Winning Percentage., , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 44-52. IOS Press, (2018)Ajax live regions: chat as a case example., and . W4A, volume 225 of ACM International Conference Proceeding Series, page 7-14. ACM, (2007)Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications., , , , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 62-81. Springer, (2012)Constrained Language Models Yield Few-Shot Semantic Parsers., , , , , , , , , and . EMNLP (1), page 7699-7715. Association for Computational Linguistics, (2021)New Anti-phishing Method with Two Types of Passwords in OpenID System., , , , and . ICGEC, page 69-72. IEEE Computer Society, (2011)