Author of the publication

Budget Allocation for Maximizing Viral Advertising in Social Networks.

, , , , , and . J. Comput. Sci. Technol., 31 (4): 759-775 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Protocols for Rule Checking in RFID Systems., , , and . ICCCN, page 1-7. IEEE, (2013)FootStep-tracker: an anchor-free indoor localization system via sensing foot steps., , , , and . UbiComp/ISWC Adjunct, page 285-288. ACM, (2015)QoS-aware placement of stream processing service., , , , and . J. Supercomput., 64 (3): 919-941 (2013)Probing into the Physical Layer: Moving Tag Detection for Large-Scale RFID Systems., , , , , and . IEEE Trans. Mob. Comput., 19 (5): 1200-1215 (2020)Modeling Geographically Correlated Failures to Assess Network Vulnerability., , and . IEEE Trans. Commun., 66 (12): 6317-6328 (2018)Modeling and Deploying Networklet., , , , , , and . GLOBECOM, page 1-6. IEEE, (2017)IMU-Kinect: a motion sensor-based gait monitoring system for intelligent healthcare., , , and . UbiComp/ISWC Adjunct, page 350-353. ACM, (2019)Delay and Capacity Analysis in MANETs with Correlated Mobility and $f$ -Cast Relay., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (11): 2829-2839 (2014)Virtual Network Embedding with Opportunistic Resource Sharing., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (3): 816-827 (2014)LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme., , , , , and . Mob. Inf. Syst., (2016)