Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clickstream data yields high-resolution maps of science, , , , , , and . PLoS ONE, 4 (3): e4803 (2009)Four-phase patterns in forced oscillatory systems, , , , , and . Phys.~Rev.~E, 62 (3): 3790--3798 (September 2000)Giant Component and Connectivity in Geographical Threshold Graphs., , and . WAW, volume 4863 of Lecture Notes in Computer Science, page 209-216. Springer, (2007)Exploring Network Structure, Dynamics, and Function using NetworkX, , and . Proceedings of the 7th Python in Science Conference, page 11 -- 15. Pasadena, CA USA, (2008)A principal component analysis of 39 scientific impact measures, , , and . CoRR, (2009)When is social computation better than the sum of its parts?, , and . CoRR, (2011)Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks., , and . DCOSS, volume 4549 of Lecture Notes in Computer Science, page 223-239. Springer, (2007)Performance of wireless sensor networks under random node failures., , and . MILCOM, page 1784-1789. IEEE, (2011)Connected Components and Credential Hopping in Authentication Graphs., , , and . SITIS, page 416-423. IEEE Computer Society, (2014)Cooperative searching for stochastic targets, , and . CoRR, (2011)