Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communities unfolding in multislice networks., , , and . CoRR, (2016)Emerging structures of P2P networks induced by social relationships., , , and . Comput. Commun., 31 (3): 620-628 (2008)Terrorism and War: Twitter Cascade Analysis., , , , and . IDC, volume 798 of Studies in Computational Intelligence, page 309-318. Springer, (2018)An adaptive overlay network inspired by social behaviour., , , and . J. Parallel Distributed Comput., 70 (3): 282-295 (2010)Discovering Community Structure on Large Networks Using a Grid Computing Environment., , and . CompleNet, volume 207 of Studies in Computational Intelligence, page 63-71. (2009)A Heuristic to Explore Trust Networks Dynamics., , , and . IDC, volume 511 of Studies in Computational Intelligence, page 67-76. Springer, (2013)Gain the Best Reputation in Trust Networks., , , and . IDC, volume 382 of Studies in Computational Intelligence, page 213-218. Springer, (2011)The Assessment of Expertise in Social Networks., , , and . IDC, volume 237 of Studies in Computational Intelligence, page 53-62. Springer, (2009)Trusting Evaluation by Social Reputation., , , and . IDC, volume 162 of Studies in Computational Intelligence, page 75-84. Springer, (2008)Hardware/software synthesis of formal specifications in codesign of embedded systems., , and . ACM Trans. Design Autom. Electr. Syst., 5 (3): 399-432 (2000)