Author of the publication

Unfolding dynamics in a social network: co-evolution oflink formation and user interaction.

, , , , , and . WWW (Companion Volume), page 67-68. International World Wide Web Conferences Steering Committee / ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions., , , , and . ICASSP, page 3477-3480. IEEE, (2009)DSwitch: a dual mode direct and network attached disk., , and . SoCC, page 71-83. ACM, (2015)VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils., , , , and . IEEE Trans. Dependable Secur. Comput., 13 (4): 488-501 (2016)Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage., , , , and . IEEE Trans. Parallel Distributed Syst., 22 (9): 1514-1527 (2011)A Topology-Aware Performance Prediction Model for Distributed Deep Learning on GPU Clusters., , , , , and . IEEE BigData, page 2795-2801. IEEE, (2020)Understanding and Surpassing Dropbox: Efficient Incremental Synchronization in Cloud Storage Services., , , and . GLOBECOM, page 1-7. IEEE, (2015)Understanding the Gift-Sending Interaction on Live-Streaming Video Websites., , and . HCI (12), volume 10282 of Lecture Notes in Computer Science, page 274-285. Springer, (2017)Detecting and Validating Sybil Groups in the Wild., , , , and . ICDCS Workshops, page 127-132. IEEE Computer Society, (2012)An Interest-based P2P RDF Query Architecture., , , , and . SKG, page 11. IEEE Computer Society, (2005)VoteTrust: Leveraging friend invitation graph to defend against social network Sybils., , , , , and . INFOCOM, page 2400-2408. IEEE, (2013)