Author of the publication

Improved trust-aware recommender system using small-worldness of trust networks.

, , , , and . Knowl. Based Syst., 23 (3): 232-238 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations., , , and . VLDB, page 416-425. Morgan Kaufmann, (1997)Sentiment analysis at sentence level for heterogeneous datasets., , , and . EDB, page 159-163. ACM, (2016)Shortest Path Analysis in Social Graphs., , and . CoRR, (2014)Activity-oriented access control to ubiquitous hospital information and services., , , , , and . Inf. Sci., 180 (16): 2979-2990 (2010)An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography., , , , , , , , and . J. Commun. Networks, 11 (6): 599-606 (2009)Visualizations of human activities in sensor-enabled ubiquitous environments., , , and . ICUMT, page 1-6. IEEE, (2009)Comparative Analysis of XLMiner and Weka for Association Rule Mining and Clustering., , , , and . FGIT-DTA, volume 64 of Communications in Computer and Information Science, page 82-89. Springer, (2009)A Study on the Feasibility of Active Contours on Automatic CT Bone Segmentation., , , and . J. Digit. Imaging, 23 (6): 793-805 (2010)Video Big Data Analytics in the Cloud: Research Issues and Challenges., , , , , and . CoRR, (2020)RweetMiner: Automatic identification and categorization of help requests on twitter during disasters., , , and . CoRR, (2023)