共 14 条
[1]
Anagnostopoulos A, 2012, P 21 INT C WORLD WID, P839, DOI DOI 10.1145/2187836.2187950
[2]
[Anonymous], 2011, P 20 ACM INT C INF K, DOI DOI 10.1145/2063576.2063718
[3]
[Anonymous], 2013, P 2013 SIAM INT C DA, DOI DOI 10.1137/1.9781611972832.65
[4]
Baghel V.S., 2018, 2018 11 INT C CONT C, P1
[5]
Cheng-Te Li, 2010, Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), P9, DOI 10.1109/SocialCom.2010.12
[6]
El-Ashmawi Walaa H., 2019, Journal of Industrial Engineering International, V15, P53, DOI 10.1007/s40092-018-0282-6
[7]
El-Ashmawi Walaa H., 2018, International Journal of Information Technology and Computer Science, V10, P16, DOI 10.5815/ijitcs.2018.05.02
[9]
Lappas T, 2009, KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P467