Author of the publication

Content Selection Methods Using User Interest Prediction Based on Similarities of Web Activities.

, , , , , , , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 119-130. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-site configuration of disaster recovery access networks made easy., , , and . Ad Hoc Networks, (2016)On-the-fly establishment of multihop wireless access networks for disaster recovery., , , and . IEEE Commun. Mag., 52 (10): 60-66 (2014)Reliable Deep Learning and IoT-Based Monitoring System for Secure Computer Numerical Control Machines Against Cyber-Attacks With Experimental Verification., , , , , , , and . IEEE Access, (2022)Synergistic approaches to mobile intelligent transportation systems considering low penetration rate., , and . Pervasive Mob. Comput., (2014)Collaboration in serious game development: a case study., and . Future Play, page 49-56. ACM, (2008)DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks., and . FDSE, volume 10018 of Lecture Notes in Computer Science, page 219-236. (2016)A Cost-effective Smart Farming System with Knowledge Base., , , , , , and . SoICT, page 309-316. ACM, (2017)An Effective Approach to Background Traffic Detection.. FDSE, volume 9446 of Lecture Notes in Computer Science, page 135-146. Springer, (2015)An effective flow aggregation for SDN-based background and foreground traffic control., , , , and . CCNC, page 1-4. IEEE, (2018)Flow aggregation for SDN-based delay-insensitive traffic control in mobile core networks., , , , and . IET Commun., 13 (8): 1051-1060 (2019)