Author:
Abu Salih Bilal,Wongthongtham Pornpit,Beheshti Seyed-Mehdi-Reza,Zajabbari Behrang
Reference31 articles.
1. Agarwal, M., Bin, Z.: Detecting malicious activities using backward propagation of trustworthiness over heterogeneous social graph. In: IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) (2013)
2. Beheshti, S.-M.-R., et al.: A Framework and a language for on-line analytical processing on graphs. In: Wang, X.S., et al. (eds.) Web Information Systems Engineering—WISE, pp. 213–227. Springer, Berlin, Heidelberg (2012)
3. Beheshti, S.-M.-R., Benatallah, B., Motahari-Nezhad, H.: Enabling the analysis of cross-cutting aspects in ad-hoc processes. In: Salinesi, C., Norrie, M., Pastor, Ó. (eds.) Advanced Information Systems Engineering, pp. 51–67. Springer, Berlin, Heidelberg (2013)
4. Berlanga, R., et al.: Towards a semantic data infrastructure for social business intelligence. In: Catania, B., et al. (eds.) New Trends in Databases and Information Systems, pp. 319–327. Springer International Publishing (2014)
5. Berners-Lee, T., Hendler, J., Lassila, O.: The semantic web. Sci. Am. 284(5), 28–37 (2001)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献