Author of the publication

Efficient Revenue Maximization for Viral Marketing in Social Networks.

, , , , and . ADMA, volume 10604 of Lecture Notes in Computer Science, page 209-224. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSMSP: A Parallelized Sampling-Based Approach for Mining Top-k Sequential Patterns in Database Graphs., , , and . DASFAA (3), volume 11448 of Lecture Notes in Computer Science, page 254-258. Springer, (2019)Techniques in Mapping Router-Level Internet Topology from Multiple Vantage Points., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 410-415. Springer, (2004)The Practice of I/O Optimizations for Out-of-Core Computation., , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 81-85. Springer, (2004)EDCleaner: Data Cleaning for Entity Information in Social Network., , , , , and . ICC, page 1-7. IEEE, (2019)Exploring Social Relations for Personalized Tag Recommendation in Social Tagging Systems., , and . IEICE Trans. Inf. Syst., 94-D (3): 542-551 (2011)SAVM: A practical secure external approach for automated in-VM management., , , and . Concurr. Comput. Pract. Exp., (2019)Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism., and . J. Supercomput., 75 (9): 5965 (2019)A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis., , , and . Applied Artificial Intelligence, 28 (6): 555-576 (2014)Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy., , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 535-540. Springer, (2014)An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection., , , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 346-347. Springer, (2009)