Author of the publication

A Case Study on the Influence of the User Profile Enrichment on Buzz Propagation in Social Media: Experiments on Delicious.

, , , , , , and . ADBIS (Short Papers and Workshops), volume 539 of Communications in Computer and Information Science, page 567-577. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profile reliability to improve recommendation in social-learning context., , , , , and . Online Inf. Rev., 44 (2): 433-454 (2020)MDER: Multi-Dimensional Event Recommendation in Social Media Context., , , , and . Comput. J., 64 (3): 369-382 (2021)Trust Evaluation Model for Attack Detection in Social Internet of Things., , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 48-64. Springer, (2018)Real-Time Mitigation of Trust-Related Attacks in Social IoT., , , and . MEDI, volume 14396 of Lecture Notes in Computer Science, page 303-318. Springer, (2023)Pertinent User Profile based on Adaptive Semi-supervised Learning., , , and . KES, volume 22 of Procedia Computer Science, page 313-320. Elsevier, (2013)LoTrust: A social Trust Level model based on time-aware social interactions and interests similarity., , , and . PST, page 428-436. IEEE, (2016)Learner's Profile Hierarchization in an Interoperable Education System., , , and . ISDA, volume 557 of Advances in Intelligent Systems and Computing, page 549-558. Springer, (2016)MEDI-ADAPT - A Distributed Architecture for Personalized Access to Heterogeneous Semi-structured Data., , , and . WEBIST, page 259-263. SciTePress, (2012)A user profile modelling using social annotations: a survey., , , and . WWW (Companion Volume), page 969-976. ACM, (2012)Proposition d'un modèle d'évaluation de la confiance pour la détection des attaques dans l'Internet des Objets Social., , , and . EGC, volume E-36 of RNTI, page 471-472. Éditions RNTI, (2020)