From post

基于神经网络的用户视频评分自动获取方法 (Neural-network-based Method for Automatic Acquisition of User's Video Rating).

, , , и . 计算机科学, 42 (11): 96-100 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Petri-Net-Based Modeling Framework for Automated Negotiation Protocols in Electronic Commerce., , и . PRIMA, том 4078 из Lecture Notes in Computer Science, стр. 324-336. Springer, (2005)基于神经网络的用户视频评分自动获取方法 (Neural-network-based Method for Automatic Acquisition of User's Video Rating)., , , и . 计算机科学, 42 (11): 96-100 (2015)An LSTM-Based Topic Flow Pattern Learning Algorithm and Its Application in Deceptive Review Detection., , и . ICGEC, том 834 из Advances in Intelligent Systems and Computing, стр. 553-561. Springer, (2018)MAC-AC: A Novel Distributed MAC Protocol for Accessing Channel in Vehicular Ad Hoc Networks., , , , , и . VTC Fall, стр. 1-5. IEEE, (2020)Research on Fake Rating Detection Algorithm Based on Deep Learning., , и . CONF-CDS, стр. 88:1-88:7. ACM, (2021)A Hybrid Recommendation List Aggregation Algorithm for Group Recommendation., , , , и . WI-IAT (1), стр. 405-408. IEEE Computer Society, (2015)An Attitude-adaptation Negotiation Strategy in Electronic Market Environments., , , , и . SNPD (3), стр. 125-130. IEEE Computer Society, (2007)Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks., , , , и . Appl. Intell., 48 (7): 1891 (2018)A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks., , , , и . Appl. Intell., 47 (4): 1115-1131 (2017)An Ontology Framework for EC Automated Negotiation Protocol., , , и . SNPD (3), стр. 432-437. IEEE Computer Society, (2007)