Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing the vulnerability of superpeer networks against attack., , , and . ACM Conference on Computer and Communications Security, page 225-234. ACM, (2007)On Fair Virtual Conference Scheduling: Achieving Equitable Participant and Speaker Satisfaction., , , and . CoRR, (2020)Toward Fair Recommendation in Two-sided Platforms, , , , and . ACM Transactions on the Web (TWEB), 16 (2): 1--34 (2021)A Large-Scale Study of the Twitter Follower Network to Characterize the Spread of Prescription Drug Abuse Tweets., , , , and . IEEE Trans. Comput. Soc. Syst., 6 (6): 1232-1244 (2019)Offsetting Unequal Competition Through RL-Assisted Incentive Schemes., , , and . IEEE Trans. Comput. Soc. Syst., 10 (1): 285-296 (February 2023)TSFS: An Integrated Approach for Event Segmentation and ADL Detection in IoT Enabled Smarthomes., , , , and . IEEE Trans. Mob. Comput., 18 (11): 2686-2700 (2019)Modelling the Redundancy of Human Speech Sound Inventories: An Information Theoretic Approach., , , and . J. Quant. Linguistics, 17 (4): 317-343 (2010)Permanence and Community Structure in Complex Networks., , , , and . ACM Trans. Knowl. Discov. Data, 11 (2): 14:1-14:34 (2016)Functions of Code-Switching in Tweets: An Annotation Framework and Some Initial Experiments., , , , and . LREC, European Language Resources Association (ELRA), (2016)Cellular Automata Based Authentication (CAA)., , and . ACRI, volume 2493 of Lecture Notes in Computer Science, page 259-269. Springer, (2002)