Author of the publication

Detecting Communities in Large Networks by Iterative Local Expansion.

, , and . CASoN, page 105-112. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Visual Information to Predict Lexical Preference., and . RANLP, page 399-405. RANLP 2011 Organising Committee, (2011)Size-constrained tree partitioning: Approximating the multicast k-tree routing problem., , and . Theor. Comput. Sci., 412 (3): 240-245 (2011)An improved approximation algorithm for the minimum 3-path partition problem., , , , , and . J. Comb. Optim., 38 (1): 150-164 (2019)On Generality and Knowledge Transferability in Cross-Domain Duplicate Question Detection for Heterogeneous Community Question Answering., , , , , , and . CoRR, (2018)Strong Equivalence of Logic Programs with Abstract Constraint Atoms., , , , and . LPNMR, volume 6645 of Lecture Notes in Computer Science, page 161-173. Springer, (2011)Using Definite Clauses and Integrity Constraints as the Basis for a Theory Formation Approach to Diagnostic Reasoning., , and . ICLP, volume 225 of Lecture Notes in Computer Science, page 211-222. Springer, (1986)An Abductive Semantics for Disjunctive Logic Programs and Its Proof Procedure., , and . FSTTCS, volume 1346 of Lecture Notes in Computer Science, page 138-152. Springer, (1997)An Improved Approximation Algorithm for the Bandpass Problem., , , and . FAW-AAIM, volume 7285 of Lecture Notes in Computer Science, page 351-358. Springer, (2012)Belief States as Default Theories: Studies in Non-Prioritized Belief Change., and . ECAI, page 8-12. John Wiley and Sons, (1998)Size-Constrained Tree Partitioning: A Story on Approximation Algorithm Design for the Multicast k-Tree Routing Problem., , and . COCOA, volume 5573 of Lecture Notes in Computer Science, page 363-374. Springer, (2009)