Author of the publication

A Novel Bipartite Graph Based Competitiveness Degree Analysis from Query Logs.

, , , , and . ACM Trans. Knowl. Discov. Data, 11 (2): 21:1-21:25 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks., , and . AMT, volume 5820 of Lecture Notes in Computer Science, page 522-528. Springer, (2009)Modeling and control of urban expressways with emergency using hybrid petri nets., , and . SMC, page 1483-1489. IEEE, (2016)Introducing Relation Compactness for Generating a Flexible Size of Search Results in Fuzzy Queries., , and . IFSA/EUSFLAT Conf., page 1462-1467. (2009)UISFuzz: An Efficient Fuzzing Method for CPU Undocumented Instruction Searching., , , and . IEEE Access, (2019)An Improved Current-Source-Converter-Based Series-Connected Wind Energy Conversion System., , and . IEEE Trans. Ind. Electron., 71 (5): 4818-4829 (May 2024)Identifying Complements and Substitutes of Products: A Neural Network Framework Based on Product Embedding., , , , and . ACM Trans. Knowl. Discov. Data, 13 (3): 34:1-34:29 (2019)A Novel Bipartite Graph Based Competitiveness Degree Analysis from Query Logs., , , , and . ACM Trans. Knowl. Discov. Data, 11 (2): 21:1-21:25 (2016)A heuristic approach for λ-representative information retrieval from large-scale data., , and . Inf. Sci., (2014)A performance simulation and verification method of packet scheduling algorithms for data stream based on QoS., , , and . Evol. Intell., 17 (1): 73-78 (2024)On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber-Physical Systems., , , and . IEEE Internet Things J., 9 (11): 8720-8736 (2022)