Author of the publication

A New Domain Adaptation Method Based on Rules Discovered from Cross-Domain Features.

, , , and . KSEM, volume 7091 of Lecture Notes in Computer Science, page 425-436. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modes-Based-Analysis of Knowledge Transfer in the Organizations., , , and . KSEM, volume 7091 of Lecture Notes in Computer Science, page 395-403. Springer, (2011)A Decision Tree Approach for Assessing and Mitigating Background and Identity Disclosure Risks., , , and . ICIS, Association for Information Systems, (2019)Effects of Carbon Emission Taxes on Transportation Mode Selections and Social Welfare., , , and . IEEE Trans. Syst. Man Cybern. Syst., 45 (11): 1413-1423 (2015)Personalized Recommendation for Balancing Content Generation and Usage on Two-Sided Entertainment Platforms., , and . ICIS, Association for Information Systems, (2022)A New Domain Adaptation Method Based on Rules Discovered from Cross-Domain Features., , , and . KSEM, volume 7091 of Lecture Notes in Computer Science, page 425-436. Springer, (2011)A robust bank asset allocation model integrating credit-rating migration risk and capital adequacy ratio regulations., , and . Ann. Oper. Res., 299 (1): 659-710 (2021)On properties of discrete (r, q) and (s, T) inventory systems., , , and . Eur. J. Oper. Res., 229 (1): 95-105 (2013)Multiobjective-integer-programming-based Sensitive Frequent Itemsets Hiding., , and . KSEM, volume 8041 of Lecture Notes in Computer Science, page 325-335. Springer, (2013)Evaluating the performance of a loading-and-unloading operations system with an imbalanced workload layout via a two-node closed queueing network model., , , and . Comput. Ind. Eng., (2024)An Improved EDP Algorithm to Privacy Protection in Data Mining., and . Brain Informatics, volume 6889 of Lecture Notes in Computer Science, page 260-271. Springer, (2011)