Author of the publication

Forming Social Networks of Trust to Incentivize Cooperation.

, , and . HICSS, page 1-10. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

There and Back Again: Detecting Regularity in Human Encounter Communities., , and . IEEE Trans. Mob. Comput., 16 (6): 1744-1757 (2017)Will you like this place? A tag-based place representation approach., , , , , and . PerCom Workshops, page 224-229. IEEE Computer Society, (2013)Adaptive data exchange model for opportunistic systems., , , and . WOWMOM, page 1-6. IEEE Computer Society, (2011)Optimisation of BFWA networks using emergent intelligence., , , , and . Communications, Internet, and Information Technology, page 431-436. IASTED/ACTA Press, (2004)Twitter Mining in the Oil Business: A Sentiment Analysis Approach., and . CGC, page 581-586. IEEE Computer Society, (2013)Estimating Base Station Requirements for 3G UMTS Services., , , and . International Conference on Wireless Networks, page 598-613. CSREA Press, (2003)Seed node deployment for wireless mesh networks with uncertain subscription., , and . WTS, page 1-7. IEEE, (2007)Social comparison based relaying in device-to-device networks., , , , , and . PIMRC, page 1-7. IEEE, (2016)Opportunistic social dissemination of micro-blogs., , , and . Ad Hoc Networks, 10 (8): 1570-1585 (2012)Generation of lower bounds for minimum span frequency assignment., , and . Discret. Appl. Math., 119 (1-2): 59-78 (2002)