Author of the publication

Optimizing Information Credibility in Social Swarming Applications.

, , , , , and . IEEE Trans. Parallel Distributed Syst., 23 (6): 1147-1158 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Competitive Location in the L1 and LINF Metrics., and . WG, volume 314 of Lecture Notes in Computer Science, page 70-83. Springer, (1987)Diagnosing Path Inflation of Mobile Client Traffic., , , , , , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 23-33. Springer, (2014)MediaScope: selective on-demand media retrieval from mobile devices., , , , , and . IPSN, page 289-300. ACM, (2013)Minimizing recovery overhead in geographic ad hoc routing., , and . Comput. Commun., 33 (11): 1343-1353 (2010)Making Eigenvector-Based Reputation Systems Robust to Collusion., , , , and . WAW, volume 3243 of Lecture Notes in Computer Science, page 92-104. Springer, (2004)Census and survey of the visible internet, , , , , and . Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, page 169--182. ACM, (2008)Trumpet: Timely and Precise Triggers in Data Centers., , , and . SIGCOMM, page 129-143. ACM, (2016)Editorial: Reviewer Appreciation Program., and . IEEE Trans. Mob. Comput., 12 (8): 1469 (2013)Editorial: A Message from the Outgoing Editor-in-Chief and Associate Editor-in-Chief., and . IEEE Trans. Mob. Comput., 13 (1): 1 (2014)Scalable and practical pursuit-evasion with networked robots., , and . Intelligent Service Robotics, 2 (4): 247-263 (2009)