Author of the publication

Time constraint influence maximization algorithm in the age of big data.

, , , , , and . Int. J. Comput. Sci. Eng., 15 (3/4): 165-175 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks., , , , , , and . J. Commun., 5 (9): 654-664 (2010)Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks., , , , and . IEEE Trans. Parallel Distributed Syst., 21 (9): 1373-1385 (2010)Sensor scheduling for p-percent coverage in wireless sensor networks., , , and . Clust. Comput., 14 (1): 27-40 (2011)Contrastive Learning for Rumor Detection via Fitting Beta Mixture Model., , , , and . CIKM, page 4160-4164. ACM, (2023)Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services., , , , , and . IIKI, volume 129 of Procedia Computer Science, page 298-304. Elsevier, (2017)Continuously Evaluating Approximate Similarity Search on High Dimensional Data Stream., , , and . J. Digit. Inf. Manag., 4 (1): 82-86 (2006)Applying big data based deep learning system to intrusion detection., , and . Big Data Min. Anal., 3 (3): 181-195 (2020)On the construction of k-connected m-dominating sets in wireless networks., , , and . J. Comb. Optim., 23 (1): 118-139 (2012)In-Network Historical Data Storage and Query Processing Based on Distributed Indexing Techniques in Wireless Sensor Networks., , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 264-273. Springer, (2009)Authentic delay bounded event detection in heterogeneous wireless sensor networks., , , and . Ad Hoc Networks, 7 (3): 599-613 (2009)