Author of the publication

A New Method for Retrieval Based on Relative Entropy with Smoothing.

, , and . AAIM, volume 3521 of Lecture Notes in Computer Science, page 183-191. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-stage residual life prediction of aero-engine based on real-time clustering and combined prediction model., , , , and . Reliab. Eng. Syst. Saf., (2022)基于延迟特性的改进随机Petri网建模与分析 (Modeling and Analysis of Improved Stochastic Petri Net Based on Delay Characteristics)., , and . 计算机科学, 42 (3): 174-177 (2015)Parallel Eclat for Opportunistic Mining of Frequent Itemsets., , , , , and . DEXA (1), volume 9261 of Lecture Notes in Computer Science, page 401-415. Springer, (2015)Deputy Mechanism for OLAP over Imprecise Data and Composite Measure., , and . CIT, page 65-70. IEEE Computer Society, (2007)Mining frequent item sets by opportunistic projection., , , and . KDD, page 229-238. ACM, (2002)Multinomial Approach and Multiple-Bernoulli Approach for Information Retrieval Based on Language Modeling., , and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 580-583. Springer, (2005)Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption., , , and . DaWaK, volume 9263 of Lecture Notes in Computer Science, page 70-81. Springer, (2015)Fault prediction of bearings based on LSTM and statistical process analysis., , , , and . Reliab. Eng. Syst. Saf., (2021)Opportunistic mining of top-n high utility patterns., , , , and . Inf. Sci., (2018)Publishing Set-Valued Data Against Realistic Adversaries.. J. Comput. Sci. Technol., 27 (1): 24-36 (2012)