Author of the publication

A Broad Learning Approach for Context-Aware Mobile Application Recommendation.

, , , , , and . ICDM, page 955-960. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fast simulation approach for tandem queueing systems., and . WSC, page 539-546. IEEE Computer Society, (1990)On-line multi-criteria based collision-free posture generation of redundant manipulator in constrained workspace., , , and . Robotica, 20 (6): 625-636 (2002)A Machine Vision Based Automatic Optical Inspection System for Measuring Drilling Quality of Printed Circuit Boards., , , and . IEEE Access, (2017)Dynamic Surface Profilometry and Resonant-Mode Detection for Microstructure Characterization Using Nonconventional Stroboscopic Interferometry., , , and . IEEE Trans. Ind. Electron., 57 (3): 1120-1126 (2010)Ranking Taiwanese management journals: A case study., , , , , , , , and . Scientometrics, 76 (1): 95-115 (2008)Design and Implementation of Fuzzy Query System Based on Ajax., , , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 659-664. Springer, (2012)When Your App is Under the Spotlight., , and . WEB, volume 296 of Lecture Notes in Business Information Processing, page 110-116. Springer, (2016)User-Oriented Graph-Based Dynamic Frequency Reuse Scheme in Heterogeneous Networks., , , and . VTC Spring, page 1-6. IEEE, (2017)A two-stage Kalman estimator for motion control using model predictive strategy., , and . ICARCV, page 1699-1704. IEEE, (2004)Email Verification Fake or Genuine?, and . ICGS3, IEEE, (2019)