Author of the publication

Establishing Ties with Bounded Capacity and Limited Network Access.

, , , , and . ICIAI, page 188-192. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Frame Concealment Algorithm for H.264/AVC., and . IEEE Trans. Image Processing, 19 (1): 98-107 (2010)Cycle-IR: Deep Cyclic Image Retargeting., , , and . CoRR, (2019)On the Maximization of Influence Over an Unknown Social Network., , , , , and . AAMAS, page 2279-2281. International Foundation for Autonomous Agents and Multiagent Systems, (2019)A time-distributed fast Fourier transform algorithm: Application to real-time implementation of iterative learning control - Experimental piezoactuator example., , , and . ACC, page 366-371. IEEE, (2016)Improving Influence Maximization from Samples: An Empirical Analysis., , , , and . MSN, page 97-102. IEEE, (2018)Effective image restoration for semantic segmentation., , , and . Neurocomputing, (2020)RDGAN: Retinex Decomposition Based Adversarial Learning for Low-Light Enhancement., , , and . ICME, page 1186-1191. IEEE, (2019)A burst-error concealment algorithm with selective spatial interpolation for visual communications over noisy channels., and . ICME, page 1371-1374. IEEE Computer Society, (2004)Application of Information Technology in the Problems and Countermeasures of Kindergarten Science Education.. DPTA, volume 1088 of Advances in Intelligent Systems and Computing, page 1031-1036. Springer, (2019)PRIME: A Mass Spectrum Data Mining Tool for De Nova Sequencing and PTMs Identification., , , , and . J. Comput. Sci. Technol., 20 (4): 483-490 (2005)