Author of the publication

An Efficient Method of Generating Deterministic Small-World and Scale-Free Graphs for Simulating Real-World Networks.

, , , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Augment or Push: A Computational Study of Bipartite Matching and Unit-Capacity Flow Algorithms., , and . ACM Journal of Experimental Algorithmics, (1998)Contemporary challenges for data-intensive scientific workflow management systems., , and . WORKS@SC, page 4:1-4:11. ACM, (2015)A New Approach to Computing Optimal Schedules for the Job-Shop Scheduling Problem., and . IPCO, volume 1084 of Lecture Notes in Computer Science, page 389-403. Springer, (1996)Datation automatique de photographies à partir de caractéristiques textuelles et visuelles. (Automatic photographs dating from textual and visual features).. University of Caen Normandy, France, (2015)Definition of the DISPEL Language, and . The DATA Bonanza: Improving Knowledge Discovery in Science, Engineering, and Business, (2013)SeleCon: Scalable IoT Device Selection and Control Using Hand Gestures., , , , and . IoTDI, page 47-58. ACM, (2017)Developing and Operating Time Critical Applications in Clouds: The State of the Art and the SWITCH Approach., , , , , , , , , and 1 other author(s). Cloud Forward, volume 68 of Procedia Computer Science, page 17-28. Elsevier, (2015)Runtime Optimization of System Utility with Variable Hardware., , and . ACM Trans. Embed. Comput. Syst., 14 (2): 24:1-24:25 (2015)What to expect that you're not expecting: A pilot video education intervention to improve patient self-efficacy surrounding discharge medication barriers., , , , , , , , and . Health Informatics J., (2019)Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks., , , , and . CoRR, (2016)