Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data, , , , , and . (2000)Querying and Tracking Influencers in Social Streams., , and . WSDM, page 493-502. ACM, (2016)Detecting Fake News Spreaders in Social Networks using Inductive Representation Learning., , and . ASONAM, page 182-189. IEEE, (2020)TeamSkill and the NBA: applying lessons from virtual worlds to the real-world., , and . ASONAM, page 156-161. ACM, (2013)IACN: Influence-Aware and Attention-Based Co-evolutionary Network for Recommendation., , and . PAKDD (2), volume 12713 of Lecture Notes in Computer Science, page 561-574. Springer, (2021)SCARLET: Explainable Attention Based Graph Neural Network for Fake News Spreader Prediction., , and . PAKDD (1), volume 12712 of Lecture Notes in Computer Science, page 714-727. Springer, (2021)Social capital: the power of influencers in networks., , , and . AAMAS, page 1243-1244. IFAAMAS, (2013)An Analytical QoS-based Resource Management Model for Multimedia Applications., and . IMSA, page 335-339. IASTED/ACTA Press, (1999)Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs., , , , and . CSE (4), page 340-345. IEEE Computer Society, (2009)Scheduling Continuous Media in a Video-On-Demand Server., and . ICMCS, page 19-28. IEEE Computer Society, (1994)