Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying and using driver nodes in temporal networks., , and . J. Complex Networks, 7 (5): 720-748 (2019)Studying the Effect of Multi-Query Functionality on a Correlation-Aware SQL-To-MapReduce Translator., and . RIIT, page 55-60. ACM, (2015)A Study of Perceptions, Usability and Future Adoption of a Web-based Learning Tool., , , , and . Int. J. Technol. Diffusion, 5 (3): 69-90 (2014)Corrigendum to "Identifying and using driver nodes in temporal networks"., , and . J. Complex Networks, (2020)Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage., , , , and . Comput. Secur., (2021)The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research., , , , , , , , , and 1 other author(s). CoRR, (2017)Fighting COVID-19 at Purdue University: Design and Evaluation of a Game for Teaching COVID-19 Hygienic Best Practices., , , , , , , , and . FDG, page 15:1-15:23. ACM, (2021)Answer Comments As Reviews: Predicting Acceptance By Measuring Valence On Stack Exchange., and . IEEE Big Data, page 4782-4791. IEEE, (2022)File Toolkit for Selective Analysis & Reconstruction (FileTSAR) for Large-Scale Networks., , , , , , , and . IEEE BigData, page 3059-3065. IEEE, (2018)GLASS: Genomic Literature Area Sequence Search., , and . BIBM Workshops, page 598-599. IEEE Computer Society, (2011)