

Author: Huang Xiangji Yao Qingsong An Aijun
Publisher: Springer Publishing Company
ISSN: 0219-1377
Source: Knowledge and Information Systems, Vol.10, Iss.4, 2006-11, pp. : 473-504
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content




By Brook Jenny
New Review of Information Networking, Vol. 9, Iss. 1, 2003-01 ,pp. :


Mining Users' Intents from Logs
International Journal of Information System Modeling and Design (IJISMD), Vol. 6, Iss. 2, 2015-04 ,pp. :

