يعرض 1 - 6 نتائج من 6 نتيجة بحث عن '"Sparse trust"', وقت الاستعلام: 0.77s تنقيح النتائج
  1. 1
    دورية أكاديمية

    المصدر: Nie , P , Xu , G , Jiao , L , Liu , S , Liu , J , Meng , W , Wu , H , Feng , M , Wang , W , Jing , Z & Zheng , X 2021 , ' Sparse Trust Data Mining ' , IEEE Transactions on Information Forensics and Security , vol. 16 , no. 99 , pp. 4559-4573 . https://doi.org/10.1109/TIFS.2021.3109412Test

    وصف الملف: application/pdf

  2. 2
  3. 3
    دورية أكاديمية

    المصدر: Hu , Z , Xu , G , Zheng , X , Liu , J , Li , Z , Sheng , Q Z , Lian , W & Xian , H 2020 , ' SSL-SVD : semi-supervised learning based sparse trust recommendation ' , ACM Transactions on Internet Technology , vol. 20 , no. 1 , 4 , pp. 1-20 . https://doi.org/10.1145/3369390Test

  4. 4
    دورية أكاديمية

    المصدر: Hu , Z , Xu , G , Zheng , X , Liu , J & Du , X 2019 , SSL-STR : semi-supervised learning for sparse trust recommendation . in 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings . Piscataway, NJ , pp. 1-6 , 2019 IEEE Global Communications Conference , Waikoloa , Hawaii , United States , 9/12/19 . https://doi.org/10.1109/GLOBECOM38437.2019.9014085Test

  5. 5
    دورية أكاديمية

    المساهمون: Vaidya, Jaideep, Li, Jin

    المصدر: Liu , M , Xu , G , Zhang , J , Shankaran , R , Luo , G , Zheng , X & Zhang , Z 2018 , Roundtable gossip algorithm : a novel sparse trust mining method for large-scale recommendation systems . in J Vaidya & J Li (eds) , Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018, Proceedings, Part IV . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 11337 LNCS , Springer-VDI-Verlag GmbH & Co. KG , Switzerland , pp. ....

  6. 6
    مورد إلكتروني

    المصدر: Nie , P , Xu , G , Jiao , L , Liu , S , Liu , J , Meng , W , Wu , H , Feng , M , Wang , W , Jing , Z & Zheng , X 2021 , ' Sparse Trust Data Mining ' , IEEE Transactions on Information Forensics and Security , vol. 16 , no. 99 , pp. 4559-4573 .