Author of the publication

LAIM: A Linear Time Iterative Approach for Efficient Influence Maximization in Large-Scale Networks.

, , , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery., , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 256-260. Springer, (2004)Online Virtual Disk Migration with Performance Guarantees in a Shared Storage Environment., , , and . PaCT, volume 3606 of Lecture Notes in Computer Science, page 226-238. Springer, (2005)Sparse Non-negative Matrix Factorization with Generalized Kullback-Leibler Divergence., , , , and . IDEAL, volume 9937 of Lecture Notes in Computer Science, page 353-360. Springer, (2016)A complete algorithm to find exact minimal polynomial by approximations., , , and . Int. J. Comput. Math., 89 (17): 2333-2344 (2012)A novel spectral efficient spatial modulation scheme., , and . BMSB, page 1-6. IEEE, (2015)An Intelligent Hybrid Algorithm for Solving Non-linear Polynomial Systems., , , and . International Conference on Computational Science, volume 3037 of Lecture Notes in Computer Science, page 26-33. Springer, (2004)Efficient algorithm for computing large scale systems of differential algebraic equations., , , , and . CoRR, (2015)Parallel computation of real solving bivariate polynomial systems by zero-matching method, , , and . CoRR, (2010)Index reduction of differential algebraic equations by differential algebraic elimination., , , , and . CoRR, (2015)Homomorphically Encrypted Arithmetic Operations over the Integer Ring., , , and . IACR Cryptology ePrint Archive, (2017)