default search action
Meili Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j11]Meili Tang, Qin Liu, Tinghuai Ma, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
$\mathcal{K}$ -Lowest-Influence Overlapping Nodes Based Community Detection in Complex Networks. IEEE Access 7: 109646-109661 (2019) - [j10]Fan Xing, Tinghuai Ma, Meili Tang, Donghai Guan:
Friend circle identification in ego network based on hybrid method. Int. J. Ad Hoc Ubiquitous Comput. 30(4): 224-234 (2019) - 2018
- [j9]Huan Rong, Tinghuai Ma, Meili Tang, Jie Cao:
A novel subgraph K+ -isomorphism method in social network based on graph similarity detection. Soft Comput. 22(8): 2583-2601 (2018) - 2017
- [j8]Jian Li, Tinghuai Ma, Meili Tang, Wenhai Shen, Yuanfeng Jin:
Improved FIFO Scheduling Algorithm Based on Fuzzy Clustering in Cloud Computing. Inf. 8(1): 25 (2017) - 2016
- [j7]Tinghuai Ma, Xichao Xu, Meili Tang, Yuanfeng Jin, Wenhai Shen:
MHBase: A Distributed Real-Time Query Scheme for Meteorological Data Based on HBase. Future Internet 8(1): 6 (2016) - [j6]Tinghuai Ma, Limin Guo, Meili Tang, Yuan Tian, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness. IEICE Trans. Inf. Syst. 99-D(6): 1512-1520 (2016) - [j5]Yuliang Zhang, Tinghuai Ma, Jie Cao, Meili Tang:
K-anonymisation of social network by vertex and edge modification. Int. J. Embed. Syst. 8(2/3): 206-216 (2016) - [j4]Yinghua Lv, Tinghuai Ma, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171: 9-22 (2016) - [j3]Tinghuai Ma, Yao Wang, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LED: A fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207: 488-500 (2016) - 2015
- [j2]Tinghuai Ma, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
KDVEM : a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12): 1165-1184 (2015) - [j1]Tinghuai Ma, Jinjuan Zhou, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Sungyoung Lee:
Social Network and Tag Sources Based Augmenting Collaborative Recommender System. IEICE Trans. Inf. Syst. 98-D(4): 902-910 (2015)
2000 – 2009
- 2007
- [c3]Tinghuai Ma, Meili Tang:
Evaluation of High-tech Program Based on Rough Set Theory. SNPD (2) 2007: 850-854 - 2006
- [c2]Tinghuai Ma, Meili Tang:
Weighted Rough Set Model. ISDA (1) 2006: 481-485 - 2005
- [c1]Tinghuai Ma, Yong-Deak Kim, Qiang Ma, Meili Tang, Weican Zhou:
Context-aware implementation based on CBR for smart home. WiMob (4) 2005: 112-115
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint