91 results on '"Li, Zhoujun"'
Search Results
2. Anonymous Transferable Conditional E-cash
3. Ancestor Excludable Hierarchical ID-Based Encryption Revisited
4. Collaborative Filtering Using Multidimensional Psychometrics Model
5. Collaborative Filtering Based on Rating Psychology
6. SQL Injection Detection via Program Tracing and Machine Learning
7. Data Sparsity: A Key Disadvantage of User-Based Collaborative Filtering?
8. When Sparsity Meets Noise in Collaborative Filtering
9. On Video Recommendation over Social Network
10. Using Concept-Level Random Walk Model and Global Inference Algorithm for Answer Summarization
11. Image Tagging by Exploiting Feature Correlation
12. Tagging Image by Exploring Weighted Correlation between Visual Features and Tags
13. An Iterative Method for Generating Loop Invariants
14. Tagging Image with Informative and Correlative Tags
15. Probabilistic Image Tagging with Tags Expanded By Text-Based Search
16. Hierarchical Classification with Dynamic-Threshold SVM Ensemble for Gene Function Prediction
17. Automatic Topic Detection with an Incremental Clustering Algorithm
18. A Method for Mobile User Profile and Reasoning
19. A Novel Composite Kernel for Finding Similar Questions in CQA Services
20. User’s Latent Interest-Based Collaborative Filtering
21. Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia
22. A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
23. Server-Controlled Identity-Based Authenticated Key Exchange
24. Online New Event Detection Based on IPLSA
25. Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings
26. Learning Kernel Matrix from Gene Ontology and Annotation Data for Protein Function Prediction
27. SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming
28. Boosting Biomedical Information Retrieval Performance through Citation Graph: An Empirical Study
29. Constraint Abstraction in Verification of Security Protocols
30. A Survey of Fuzzy Decision Tree Classifier Methodology
31. Hamiltonicity and Pancyclicity of Binary Recursive Networks
32. Research of Routing Algorithm in Hierarchy-Adaptive P2P Systems
33. Hamiltonian Property on Binary Recursive Networks
34. A New Fuzzy Decision Tree Classification Method for Mining High-Speed Data Streams Based on Binary Search Trees
35. Constraints Solution for Time Sensitive Security Protocols
36. An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams
37. Model Checking for BPEL4WS with Time
38. A New Decision Tree Classification Method for Mining High-Speed Data Streams Based on Threaded Binary Search Trees
39. An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming
40. A New Component-Oriented Programming Language with the First-Class Connector
41. HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems
42. Mining Maximal Frequent ItemSets Using Combined FP-Tree
43. Fast Mining Maximal Frequent ItemSets Based on FP-Tree
44. A Proof Assistant for Mobile Processes
45. Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes
46. Checking strong/Weak bisimulation equivalences and observation congruence for the π-calculus : Extended abstract
47. Collaborative Filtering Using Multidimensional Psychometrics Model
48. Ancestor Excludable Hierarchical ID-Based Encryption Revisited
49. Collaborative Filtering Based on Rating Psychology
50. SQL Injection Detection via Program Tracing and Machine Learning
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.