Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking Bad: Finding Triangle-Breaking Points in Large Networks., and . CSoNet, volume 9197 of Lecture Notes in Computer Science, page 285-295. Springer, (2015)A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks., , , and . J. Comb. Optim., 30 (3): 747-767 (2015)On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling., , and . IEEE Trans. Mob. Comput., 12 (2): 233-247 (2013)Finding Community Structure with Performance Guarantees in Complex Networks, and . CoRR, (2011)Blocking Self-avoiding Walks Stops Cyber-epidemics: A Scalable GPU-based Approach., , , and . CoRR, (2017)Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization'., , and . CSoNet, volume 11280 of Lecture Notes in Computer Science, page 273-285. Springer, (2018)Cheap, easy, and massively effective viral marketing in social networks: truth or fiction?, , and . HT, page 165-174. ACM, (2012)Optimal packet scan against malicious attacks in smart grids., , , , and . Theor. Comput. Sci., (2016)Smartphone-Based SpO2 Measurement by Exploiting Wavelengths Separation and Chromophore Compensation., , , , , , , and . ACM Trans. Sens. Networks, 16 (1): 9:1-9:30 (2020)Outward Influence and Cascade Size Estimation in Billion-scale Networks., , , and . SIGMETRICS (Abstracts), page 63. ACM, (2017)