Author of the publication

PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information.

, , , , and . CIKM, page 629-638. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subject-based extraction of a latent blog community., , , , and . Inf. Sci., 184 (1): 215-229 (2012)An effective data clustering method based on expected update time in flash memory environment., , , , , and . SAC, page 1492-1497. ACM, (2014)Hierarchical data organization for effective retrieval of similar shaders., , , and . RACS, page 43-48. ACM, (2012)Analysis of SCTP Handover by Movement Patterns., , and . ICIC (2), volume 3645 of Lecture Notes in Computer Science, page 521-529. Springer, (2005)mSCTP for Vertical Handover Between Heterogeneous Networks., and . Human.Society@Internet, volume 3597 of Lecture Notes in Computer Science, page 28-36. Springer, (2005)A Topic-Oriented Analysis of Information Diffusion in a Blogosphere., , , , and . DEXA (2), volume 7447 of Lecture Notes in Computer Science, page 129-140. Springer, (2012)On identifying k-nearest neighbors in neighborhood models for efficient and effective collaborative filtering., , , and . Neurocomputing, (2018)On Evaluating Performance Characteristics of a Multidimensional File Structure., , and . IADT, page 505-512. Society for Design and Process Science, 1302 West 25th Street, Suite 300, Austin, TX 78705-4236, USA, (1998)Convergence of the preconditioned AOR method for irreducible L-matrices., and . Appl. Math. Comput., 201 (1-2): 56-64 (2008)Credible, resilient, and scalable detection of software plagiarism using authority histograms., , , , , and . Knowl. Based Syst., (2016)