Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Accounting of Differential Privacy via Characteristic Function., , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 4782-4817. PMLR, (2022)Projection-Based Coverage Algorithms in 3D Camera Sensor Networks for Indoor Objective Tracking., , , , , and . CSoNet, volume 11917 of Lecture Notes in Computer Science, page 309-320. Springer, (2019)Competitive ratios for preemptive and non-preemptive online scheduling with nondecreasing concave machine cost., , , , and . Inf. Sci., (2014)PTAS for minimum k-path vertex cover in ball graph., , , , and . Inf. Process. Lett., (2017)Minimum Cost Stable Outcome in Exchange Networks., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Distributed Influence Maximization for Large-Scale Online Social Networks., , , and . ICDE, page 81-95. IEEE, (2022)Influence and Profit: Two Sides of the Coin., , , , , and . ICDM, page 1301-1306. IEEE Computer Society, (2013)CSI: Charged System Influence Model for Human Behavior Prediction., , and . ICDM, page 31-40. IEEE Computer Society, (2013)Jammer Mitigation in Absorptive RIS-Assisted Uplink NOMA., , , , , and . CoRR, (2024)An approximation algorithm for client assignment in client/server systems., , , , , , and . INFOCOM, page 2777-2785. IEEE, (2014)