Author of the publication

Bayesian Belief Network Model Using Sematic Concept for Expert Finding.

, , , and . KSEM, volume 12816 of Lecture Notes in Computer Science, page 114-125. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting fast hardware floating point in high precision computation., and . ISSAC, page 111-118. ACM, (2003)Research on the selection of strategic supplier based on grey relation and multi level fuzzy evaluation in the electronics industry., and . SMC, page 12-16. IEEE, (2012)Qualitative Analysis for a Kind of Predator-Prey Model of Holling III-Function Response with Nonlinear Density Dependent., , and . CIS, page 1532-1535. IEEE Computer Society, (2011)A survey of bottom-up behavioral modeling methods for analog circuits., , , , and . ISCAS (3), page 910-913. IEEE, (2003)Hybrid causal methodology in quantitative risk assessment for the on-board ATP of high speed railway., , and . ITSC, page 1577-1582. IEEE, (2014)Understanding railway operational accidents using network theory., , , and . Reliab. Eng. Syst. Saf., (2019)Path partition of planar graphs with girth at least six., , and . Discret. Math. Algorithms Appl., 15 (7): 2250158:1-2250158:7 (October 2023)Hetero$^2$Net: Heterophily-aware Representation Learning on Heterogenerous Graphs., , , , , , , , , and 2 other author(s). CoRR, (2023)Secure Model-Contrastive Federated Learning With Improved Compressive Sensing., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Interpretability application of the Just-in-Time software defect prediction model., , , and . J. Syst. Softw., (2022)