Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing Information Diets of Social Media Users., , , , and . ICWSM, page 218-227. AAAI Press, (2015)Reverse Engineering Socialbot Infiltration Strategies in Twitter., , , and . CoRR, (2014)Run-time delays in Indian Railways: is traffic the cause?, , , and . ACM DEV (3), page 20:1-20:2. ACM, (2013)Utilizing Microblogs for Assisting Post-Disaster Relief Operations via Matching Resource Needs and Availabilities., , , and . CoRR, (2020)Chimeras in Multiplex Networks: Interplay of Inter- and Intra-Layer Delays., , , and . Frontiers Appl. Math. Stat., (2019)A Double Layer Cross-Slot Aperture-Fed Millimeter-Wave Antenna Array With Wide Axial Ratio Bandwidth., , and . IEEE Access, (2023)Emergence of Chimera in Multiplex Network., and . Int. J. Bifurc. Chaos, 26 (7): 1650120:1-1650120:10 (2016)Robust, Resilient and Reliable Architecture for V2X Communications., , , , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4414-4430 (2021)Secrecy Capacity in CRN With Malicious Energy Harvester Using Game Theoretic Techniques., , , and . IEEE Trans. Cogn. Commun. Netw., 3 (3): 343-360 (2017)Optimizing the recency-relevance-diversity trade-offs in non-personalized news recommendations., , , and . Inf. Retr. J., 22 (5): 447-475 (2019)