Author of the publication

Opinion Formation by Voter Model with Temporal Decay Dynamics.

, , , and . ECML/PKDD (2), volume 7524 of Lecture Notes in Computer Science, page 565-580. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Converting Ordinary Rules into Default Rules Based on Contradiction of Knowledge Base., , , , and . EJC, volume 67 of Frontiers in Artificial Intelligence and Applications, page 248-258. IOS Press, (2000)On Operations for Reconstructing the Complete/Incomplete Knowledge., , , and . EJC, volume 67 of Frontiers in Artificial Intelligence and Applications, page 41-51. IOS Press, (2000)A Method to Divide Stream Data of Scores over Review Sites., , , , , and . PRICAI, volume 8862 of Lecture Notes in Computer Science, page 913-919. Springer, (2014)On Formation of Exception Hierarchy., , and . PRICAI, volume 1114 of Lecture Notes in Computer Science, page 534-545. Springer, (1996)Accelerating Computation of Distance Based Centrality Measures for Spatial Networks., , , and . DS, volume 9956 of Lecture Notes in Computer Science, page 376-391. (2016)The Effect of Metaphoric Gestures on Schematic Understanding of Instruction Performed by a Pedagogical Conversational Agent., , , , , and . HCI (24), volume 9192 of Lecture Notes in Computer Science, page 361-371. Springer, (2015)Analysis of Hepatitis Dataset by Decision Tree Based on Graph-Based Induction., , , , , , , and . JSAI Workshops, volume 3609 of Lecture Notes in Computer Science, page 5-28. Springer, (2004)Solving contradiction in knowledge-base without interaction., , , , and . SMC, page 1546-1551. IEEE, (1998)Non-monotonic inference system handling knowledge allowing classified exceptions., , and . SMC, page 1558-1563. IEEE, (1998)Efficient computation of target-oriented link criticalness centrality in uncertain graphs., , , , and . Intell. Data Anal., 25 (5): 1323-1343 (2021)