Author of the publication

Kernel Searching Strategy for Recommender Searching Mechanism.

, , , , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 441-449. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factors influencing out of pocket ratio to CPS among NPC patients in Guangxi: 2014-2020., , , , , and . HPCC/DSS/SmartCity/DependSys, page 2159-2163. IEEE, (2022)Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data., , , , and . CoRR, (2014)Multi-domain Dialogue State Tracking as Dynamic Knowledge Graph Enhanced Question Answering., and . CoRR, (2019)Low-Rank and Continuous Target Feature Enhancement for SAR Object Recognition., , , , and . IGARSS, page 3740-3743. IEEE, (2019)Effective storage location assignment model based on a genetic simulation annealing algorithm., , , , , and . Int. J. Wirel. Mob. Comput., 19 (1): 9-17 (2020)A Survey on Contextual Multi-armed Bandits.. CoRR, (2015)Polyphonic piano transcription based on graph convolutional network., , and . Signal Process., (November 2023)A Low-Power and High-PSNR Unified DCT/IDCT Architecture Based on EARC and Enhanced Scale Factor Approximation., , , , , and . IEEE Access, (2019)Android Custom Permissions Demystified: A Comprehensive Security Evaluation., , , , , and . IEEE Trans. Software Eng., 48 (11): 4465-4484 (2022)An Effective Identification Technology for Online News Comment Spammers in Internet Media., , , , , , and . IEEE Access, (2019)