Author of the publication

Personalised content recommendation based on field authorities in transparent computing.

, , , , and . Int. J. Ad Hoc Ubiquitous Comput., 21 (2): 119-129 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A knowledge-based specification technique for protocol development., , and . J. Comput. Sci. Technol., 8 (2): 188-192 (1993)UCSI Towards a User-Centric Service Integration Approach., , , , and . APSEC, page 568. IEEE Computer Society, (2007)Data Rate Trading in Mobile Networks: A Truthful Online Auction Approach., , , , and . ICC, page 1-6. IEEE, (2019)Deep Collaborative Filtering Incorporating Auxiliary Multi-Media Information., , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 909-916. IEEE, (2018)Research challenges and perspectives on Wisdom Web of Things (W2T)., , , , , , and . J. Supercomput., 64 (3): 862-882 (2013)A Truthful Online Mechanism for Collaborative Computation Offloading in Mobile Edge Computing., , , and . IEEE Trans. Ind. Informatics, 16 (7): 4832-4841 (2020)A XML-Based Data Communication Solution for Program Mining., , , and . IDEAL, volume 2690 of Lecture Notes in Computer Science, page 569-575. Springer, (2003)MeetingVis: Visual Narratives to Assist in Recalling Meeting Context and Content., , , , , and . IEEE Trans. Vis. Comput. Graph., 24 (6): 1918-1929 (2018)A Novel Framework for Service Description and Operations., , , , , and . UIC, volume 6406 of Lecture Notes in Computer Science, page 366-381. Springer, (2010)Exploiting channel-aware reputation system against selective forwarding attacks in WSNs., , , and . GLOBECOM, page 330-335. IEEE, (2014)