共 11 条
[1]
Cazabet Remy, 2010, Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), P309, DOI 10.1109/SocialCom.2010.51
[3]
Gregory S, 2007, LECT NOTES ARTIF INT, V4702, P91
[4]
Jingyong Li, 2012, 2012 International Conference on Systems and Informatics (ICSAI 2012), P2224, DOI 10.1109/ICSAI.2012.6223494
[6]
Lin Yu-Ru, 2008, P 17 INT C WORLD WID, P685
[10]
Tantipathananandh C, 2007, KDD-2007 PROCEEDINGS OF THE THIRTEENTH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P717