Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Top-Down Algorithm for Mining Web Access Patterns from Web Logs., , , , , , , and . PAKDD, volume 3518 of Lecture Notes in Computer Science, page 838-843. Springer, (2005)PICC: A Secure Mobile Agent Framework Based on Garbled Circuit., , , , , and . AINA, page 357-362. IEEE Computer Society, (2005)Robustness Analysis of Model-Based Collaborative Filtering Systems., and . AICS, volume 6206 of Lecture Notes in Computer Science, page 3-15. Springer, (2009)A Security Model Design in Web Service Environment., , , and . CIT, page 736-740. IEEE Computer Society, (2005)PHC: A Fast Partition and Hierarchy-Based Clustering Algorithm., , , and . J. Comput. Sci. Technol., 18 (3): 407-411 (2003)A Web Service-Based Framework for Supply Chain Management., , , , and . ISORC, page 316-319. IEEE Computer Society, (2005)CLINCH: Clustering Incomplete High-Dimensional Data for Data Mining Application., , , , , , and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 88-99. Springer, (2005)Effective diverse and obfuscated attacks on model-based recommender systems., and . RecSys, page 141-148. ACM, (2009)Analysis of robustness in trust-based recommender systems., and . RIAO, page 114-121. CID - Le Centre de Hautes Etudes Internationales D'Informatique Documentaire, (2010)SUDEPHIC: Self-Tuning Density-Based Partitioning and Hierarchical Clustering., , , , , and . DASFAA, volume 2973 of Lecture Notes in Computer Science, page 554-567. Springer, (2004)