Author of the publication

Approximation algorithms for two variants of correlation clustering problem.

, , , and . J. Comb. Optim., 43 (5): 933-952 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks., , , , and . Mob. Inf. Syst., (2018)Security preservation in industrial medical CPS using Chebyshev map: An AI approach., , , , and . Future Gener. Comput. Syst., (2021)Analysis of data replication mechanism in NoSQL database MongoDB., , , , and . ICCE-TW, page 66-67. IEEE, (2015)The seeding algorithm for spherical k-means clustering with penalties., , , , and . J. Comb. Optim., 44 (3): 1977-1994 (2022)Key Exposure Resistant Group Key Agreement Protocol., , , , and . ProvSec, volume 13059 of Lecture Notes in Computer Science, page 83-97. Springer, (2021)An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid., and . DSC, page 1-2. IEEE, (2021)Approximation Algorithms for the Lower Bounded Correlation Clustering Problem., , , and . CSoNet, volume 13116 of Lecture Notes in Computer Science, page 39-49. Springer, (2021)From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks., , , , and . INFOCOM, page 334-342. IEEE, (2014)A certificateless signcryption scheme for smart home networks., , , , and . Concurr. Comput. Pract. Exp., 33 (7): 1 (2021)Efficient public auditing scheme for non-administrator group with secure user revocation., , , , and . J. Inf. Secur. Appl., (February 2024)