Author of the publication

Dynamic Relationship Building: Exploitation Versus Exploration on a Social Network.

, , and . WISE (1), volume 10569 of Lecture Notes in Computer Science, page 75-90. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Corrections to "Efficient Motion Vector Interpolation for Error Concealment of H.264/AVC" Mar 11 75-80., , and . TBC, 57 (2): 326 (2011)Efficient Motion Vector Interpolation for Error Concealment of H.264/AVC., , and . TBC, 57 (1): 75-80 (2011)Data Possession Provability on Semi-trusted Cloud Storage., , and . CloudComp, volume 133 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 199-209. Springer, (2013)A survey on high coherence visual media retargeting: recent advances and applications., and . Frontiers Comput. Sci., 10 (5): 778-796 (2016)Observation of dipolar spin-exchange interactions with lattice-confined polar molecules, , , , , , , and . Nature, 501 (7468): 521--525 (Sep 26, 2013)AppJoy: personalized mobile application discovery., and . MobiSys, page 113-126. ACM, (2011)Evaluation of agri-product supply chain competitiveness based on extension theory., , and . Operational Research, 19 (2): 543-570 (2019)Lowcomplexity content-aware image retargeting., , and . ICIP, page 2105-2108. IEEE, (2012)Foreground Detection in Surveillance Video with Fully Convolutional Semantic Network., , and . ICIP, page 4118-4122. IEEE, (2018)Efficient P-frame complexity estimation for frame layer rate control of H.264/AVC., and . ICIP, page 1669-1672. IEEE, (2011)