Author of the publication

Leveraging Social Interactions to Suggest Friends.

, , , and . ICDCS Workshops, page 386-391. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do we really need to catch them all? A new User-guided Social Media Crawling method., , , and . CoRR, (2016)Governing AI safety through independent audits., , , , , , , , , and 10 other author(s). Nat. Mach. Intell., 3 (7): 566-571 (2021)A Socially-Aware Operating System for Trustworthy Computing., , , , , and . ICSC, page 380-386. IEEE Computer Society, (2011)SIN: A Platform to Make Interactions in Social Networks Accessible., , , , , and . SocialInformatics, page 205-214. IEEE Computer Society, (2012)Read What You Trust: An Open Wiki Model Enhanced by Social Context., , , , and . SocialCom/PASSAT, page 370-379. IEEE Computer Society, (2011)Leveraging Social Interactions to Suggest Friends., , , and . ICDCS Workshops, page 386-391. IEEE Computer Society, (2013)A Cloud Theory-Based Trust Computing Model in Social Networks., , , , and . Entropy, 19 (1): 11 (2017)TCPtransform: Property-Oriented TCP Traffic Transformation., , , , , , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 222-240. Springer, (2005)SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11., , , , , and . GLOBECOM, page 768-772. IEEE, (2002)Trustworthy opportunistic sensing: A Social Computing Paradigm., , , and . IRI, page 513-518. IEEE Systems, Man, and Cybernetics Society, (2011)