Author of the publication

Measuring the influence of social networks on information diffusion on blogspheres

, , and . Machine Learning and Cybernetics, 2009 International Conference on, 6, page 3492--3498. IEEE, (July 2009)
DOI: 10.1109/icmlc.2009.5212771

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling jobs with chain precedence constraints and deteriorating jobs., , and . J. Oper. Res. Soc., 62 (9): 1765-1770 (2011)Joint Optimization of Stateful VNF Placement and Routing Scheduling in Software-Defined Networks., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 9-14. IEEE, (2018)Deep Learning-based Transformation Matrix Estimation for Bidirectional Interframe Prediction., , and . GCCE, page 726-730. IEEE, (2018)A topology-aware method for scientific application deployment on cloud., , , , and . IJWGS, 10 (4): 338-370 (2014)On the Design of Hybrid Control Systems Using Automata Models., and . FSTTCS, volume 1180 of Lecture Notes in Computer Science, page 156-167. Springer, (1996)Compositional Verification of UML Dynamic Models., , , and . APSEC, page 286-293. IEEE Computer Society, (2007)Different Traffic Density Connectivity Probability Analysis in VANETs with Measured Data at 5.9 GHz., , , , , , , and . ITST, page 1-7. IEEE, (2018)S2PF: speculative symbolic PathFinder., , and . ACM SIGSOFT Softw. Eng. Notes, 37 (6): 1-5 (2012)Counterexample-Preserving Reduction for Symbolic Model Checking., , , , , and . J. Appl. Math., (2014)SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning., , , and . WCNC, page 1-5. IEEE, (2020)