| Publication | Date of Publication | Type |
|---|
scientific article; zbMATH DE number 7650257 (Why is no real title available?) (available as arXiv preprint) | 2023-02-03 | Paper |
Adaptive Greedy versus Non-adaptive Greedy for Influence Maximization Journal of Artificial Intelligence Research | 2022-08-02 | Paper |
scientific article; zbMATH DE number 7559067 (Why is no real title available?) (available as arXiv preprint) | 2022-07-18 | Paper |
Higher order monotonicity and submodularity of influence in social networks: from local to global Information and Computation | 2022-06-08 | Paper |
Voter model on signed social networks Internet Mathematics | 2021-04-26 | Paper |
| A Note on the Boundedness of Doob Maximal Operators on a Filtered Measure Space | 2021-03-04 | Paper |
| Failure detection and consensus in the crash-recovery model | 2020-12-03 | Paper |
A graph-theoretical basis of stochastic-cascading network influence: characterizations of influence-based centrality Theoretical Computer Science | 2020-05-23 | Paper |
Coreness of cooperative games with truncated submodular profit functions Theoretical Computer Science | 2020-05-23 | Paper |
Complete submodularity characterization in the comparative independent cascade model Theoretical Computer Science | 2019-08-20 | Paper |
Complete submodularity characterization in the comparative independent cascade model Lecture Notes in Computer Science | 2019-04-26 | Paper |
Coreness of cooperative games with truncated submodular profit functions Lecture Notes in Computer Science | 2018-11-08 | Paper |
On the quality of service of failure detectors IEEE Transactions on Computers | 2018-07-09 | Paper |
On the quality of service of failure detectors IEEE Transactions on Computers | 2018-07-09 | Paper |
The Routing of Complex Contagion in Kleinberg’s Small-World Networks Lecture Notes in Computer Science | 2016-09-02 | Paper |
Combinatorial multi-armed bandit and its extension to probabilistically triggered arms Journal of Machine Learning Research (JMLR) | 2016-06-06 | Paper |
Combinatorial multi-armed bandit and its extension to probabilistically triggered arms Journal of Machine Learning Research (JMLR) | 2016-06-06 | Paper |
On the hyperbolicity of small-world and treelike random graphs Internet Mathematics | 2016-05-25 | Paper |
A compact routing scheme and approximate distance oracle for power-law graphs ACM Transactions on Algorithms | 2014-12-05 | Paper |
On the power of breakable objects Theoretical Computer Science | 2014-09-02 | Paper |
Partition approach to failure detectors for \(k\)-set agreement Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing | 2014-03-13 | Paper |
Scalable influence maximization for independent cascade model in large-scale social networks Data Mining and Knowledge Discovery | 2013-03-28 | Paper |
On the hyperbolicity of small-world and tree-like random graphs Lecture Notes in Computer Science | 2013-03-21 | Paper |
Bounded budget betweenness centrality game for strategic network formations Theoretical Computer Science | 2012-01-04 | Paper |
Implementing uniform reliable broadcast with binary consensus in systems with fair-lossy links Information Processing Letters | 2010-09-02 | Paper |
Bounded cost algorithms for multivalued consensus using binary consensus instances Information Processing Letters | 2010-08-20 | Paper |
Compact Routing in Power-Law Graphs Lecture Notes in Computer Science | 2009-11-19 | Paper |
The isolation game: a game of distances Theoretical Computer Science | 2009-11-06 | Paper |
Bounded Budget Betweenness Centrality Game for Strategic Network Formations Lecture Notes in Computer Science | 2009-10-29 | Paper |
On the α-Sensitivity of Nash Equilibria in PageRank-Based Network Reputation Games Frontiers in Algorithmics | 2009-07-14 | Paper |
The Isolation Game: A Game of Distances Algorithms and Computation | 2009-01-29 | Paper |
Weakening Failure Detectors for k-Set Agreement Via the Partition Approach Lecture Notes in Computer Science | 2008-09-02 | Paper |
Ranking of Closeness Centrality for Large-Scale Social Networks Frontiers in Algorithmics | 2008-06-19 | Paper |
On Quiescent Reliable Communication SIAM Journal on Computing | 2000-10-18 | Paper |
Using the heartbeat failure detector for quiescent reliable communication and consensus in partitionable networks Theoretical Computer Science | 1999-06-21 | Paper |