Search

Your search keyword '"Li, Zhoujun"' showing total 91 results

Search Constraints

Start Over You searched for: Author "Li, Zhoujun" Remove constraint Author: "Li, Zhoujun" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
91 results on '"Li, Zhoujun"'

Search Results

2. Anonymous Transferable Conditional E-cash

3. Ancestor Excludable Hierarchical ID-Based Encryption Revisited

4. Collaborative Filtering Using Multidimensional Psychometrics Model

5. Collaborative Filtering Based on Rating Psychology

6. SQL Injection Detection via Program Tracing and Machine Learning

7. Data Sparsity: A Key Disadvantage of User-Based Collaborative Filtering?

8. When Sparsity Meets Noise in Collaborative Filtering

9. On Video Recommendation over Social Network

10. Using Concept-Level Random Walk Model and Global Inference Algorithm for Answer Summarization

11. Image Tagging by Exploiting Feature Correlation

12. Tagging Image by Exploring Weighted Correlation between Visual Features and Tags

13. An Iterative Method for Generating Loop Invariants

14. Tagging Image with Informative and Correlative Tags

15. Probabilistic Image Tagging with Tags Expanded By Text-Based Search

16. Hierarchical Classification with Dynamic-Threshold SVM Ensemble for Gene Function Prediction

17. Automatic Topic Detection with an Incremental Clustering Algorithm

18. A Method for Mobile User Profile and Reasoning

19. A Novel Composite Kernel for Finding Similar Questions in CQA Services

20. User’s Latent Interest-Based Collaborative Filtering

21. Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia

22. A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks

23. Server-Controlled Identity-Based Authenticated Key Exchange

24. Online New Event Detection Based on IPLSA

25. Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings

26. Learning Kernel Matrix from Gene Ontology and Annotation Data for Protein Function Prediction

27. SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming

28. Boosting Biomedical Information Retrieval Performance through Citation Graph: An Empirical Study

29. Constraint Abstraction in Verification of Security Protocols

31. Hamiltonicity and Pancyclicity of Binary Recursive Networks

32. Research of Routing Algorithm in Hierarchy-Adaptive P2P Systems

33. Hamiltonian Property on Binary Recursive Networks

34. A New Fuzzy Decision Tree Classification Method for Mining High-Speed Data Streams Based on Binary Search Trees

35. Constraints Solution for Time Sensitive Security Protocols

37. Model Checking for BPEL4WS with Time

38. A New Decision Tree Classification Method for Mining High-Speed Data Streams Based on Threaded Binary Search Trees

39. An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming

40. A New Component-Oriented Programming Language with the First-Class Connector

41. HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems

42. Mining Maximal Frequent ItemSets Using Combined FP-Tree

43. Fast Mining Maximal Frequent ItemSets Based on FP-Tree

44. A Proof Assistant for Mobile Processes

Catalog

Books, media, physical & digital resources