Author of the publication

On the Measurement and Prediction of Web Content Utility: A Review.

, , , and . SIGKDD Explor., 19 (2): 1-12 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Four-Flavour Leading Hadronic Contribution To The Muon Anomalous Magnetic Moment, , , , , and . (Aug 20, 2013)Ultrahigh Durability Perovskite Solar Cells, , , , , , , , and . Nano Letters, (February 2019)3-D information of a space target retrieved from a sequence of high-resolution 2-D ISAR images., , and . IGARSS, page 5000-5002. IEEE, (2016)Low-Energy Security-Enhanced Routing Protocol Based on DBSCAN Partition., , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 349-360. Springer, (2017)Exploring Review Content for Recommendation via Latent Factor Model., , , and . PRICAI, volume 8862 of Lecture Notes in Computer Science, page 668-679. Springer, (2014)4-Bit Optimized Coding Metasurface for Wideband RCS Reduction., , , , and . IEEE Access, (2019)MATRI: a multi-aspect and transitive trust inference model., , , , and . WWW, page 1467-1476. International World Wide Web Conferences Steering Committee / ACM, (2013)An Effective Approach for Routing the Bug Reports to the Right Fixers., , , , and . Internetware, page 11:1-11:10. ACM, (2018)Invariant Set-Based Analysis of Minimal Detectable Fault for Discrete-Time LPV Systems With Bounded Uncertainties., , , , and . IEEE Access, (2019)A novel approach for hiding sensitive utility and frequent itemsets., , and . Intell. Data Anal., 22 (6): 1259-1278 (2018)