default search action
CSoNet 2018: Shanghai, China
- Xuemin Chen, Arunabha Sen, Wei Wayne Li, My T. Thai:
Computational Data and Social Networks - 7th International Conference, CSoNet 2018, Shanghai, China, December 18-20, 2018, Proceedings. Lecture Notes in Computer Science 11280, Springer 2018, ISBN 978-3-030-04647-7 - Ruidong Yan, Deying Li, Weili Wu, Ding-Zhu Du:
Minimizing Influence of Rumors by Blockers on Social Networks. 1-12 - Canh V. Pham, Hieu V. Duong, Bao Q. Bui, My T. Thai:
Budgeted Competitive Influence Maximization on Online Social Networks. 13-24 - Quan-Lin Li, Jing-Yu Ma, Yan-Xia Chang:
Blockchain Queue Theory. 25-40 - Gaocai Wang, Ying Peng, Qifei Zhao:
Optimal Energy Efficiency Data Dissemination Strategy Based on Optimal Stopping Theory in Mobile Network. 41-52 - Quanquan Chu, Zhenhao Cao, Xiaofeng Gao, Peng He, Qianni Deng, Guihai Chen:
Cease with Bass: A Framework for Real-Time Topic Detection and Popularity Prediction Based on Long-Text Contents. 53-65 - Yuwei Zhang, Guanjun Liu, Wenjing Luan, Chungang Yan, Changjun Jiang:
Application of SIRUS in Credit Card Fraud Detection. 66-78 - Si Zhang, Hanghang Tong, Jiejun Xu, Ross Maciejewski:
Graph Convolutional Networks: Algorithms, Applications and Open Challenges. 79-91 - Mengran Xu, Demin Li, Guanglin Zhang, Mengqi Cao, Shuya Liao:
A Path Planning Approach with Maximum Traffic Flow and Minimum Breakdown Probability in Complex Road Network. 92-102 - Wenlong Ni, Wei Wayne Li:
Optimal Resource Allocation for Brokers in Media Cloud. 103-115 - Pavel Krömer, Jana Nowaková, Martin Hasal:
Towards a New Evolutionary Algorithm for the Minimum Tollbooth Problem. 116-125 - Wenan Tan, Lu Zhao, Na Xie, Anqiong Tang, Xiaoming Hu, Shan Tang:
Methods for Optimal Resource Allocation on Cooperative Task Scheduling in Cross-Organizational Business Process. 126-138 - Aiping Zhang, Demin Li, Guanglin Zhang, Junjie Wang, Mengqi Cao:
A Vehicular Collision Avoidance Routing Algorithm based on V2V. 139-151 - Yizhi Wu, Biao Luo, Hairui Zhu:
Embedded Software-Define Radio for Wearable Microware Detection. 152-161 - Chandni Saxena, Mohammad Najmud Doja, Tanvir Ahmad:
Group Based Immunization Strategy on Networks with Nonlinear Infectivity. 162-173 - Phuc H. Duong, Hien T. Nguyen, Hao T. Do:
Question Understanding in Community-Based Question Answering Systems. 174-185 - Chao Kong, Wan Tao, Sanmin Liu, Qiang Zhang:
User Linkage Across Anonymizd Social Networks. 186-197 - Akrati Saxena, S. R. S. Iyengar:
K-Shell Rank Analysis Using Local Information. 198-210 - Truc D. T. Nguyen, Hoang-Anh Pham, My T. Thai:
Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications. 211-221 - Na Wang, Xuemin Chen:
A Formal Model for Temporal - Spatial Event in Internet of Vehicles. 222-234 - Christopher Diaz, Alexander G. Nikolaev, Eduardo L. Pasiliao:
A Decentralized Deterministic Information Propagation Model for Robust Communication. 235-246 - Denis Kotkov, Gaurav Pandey, Alexander Semenov:
Gaming Bot Detection: A Systematic Literature Review. 247-258 - Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Graph-Based Comparison of IoT and Android Malware. 259-272 - Hung T. Nguyen, Thang N. Dinh, My T. Thai:
Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization'. 273-285 - Wei Chen:
An Issue in the Martingale Analysis of the Influence Maximization Algorithm IMM. 286-297 - Quan-Lin Li, Fan-Qi Ma, Jing-Yu Ma:
A Stochastic Model for File Lifetime and Security in Data Center Networks. 298-309 - Mingzhang Luo, Hao Zhang, Qiang Liu, Yang Xu, Chong Luo, Zhongyuan Wang:
The Design of Real Time Recording System for Electric Spark Source Parameters Based on the Internet of Things. 310-317 - Wenrong Jiang:
App Tamper Detection and Retrospective Program Research. 318-329 - Han Hu, NhatHai Phan, James Geller, Huy T. Vo, Manasi Bhole, Xueqi Huang, Sophie Di Lorio, Thang Dinh, Soon Ae Chun:
Deep Self-Taught Learning for Detecting Drug Abuse Risk Behavior in Tweets. 330-342 - Shiyang Xuan, Guanjun Liu, Zhenchuan Li:
Refined Weighted Random Forest and Its Application to Credit Card Fraud Detection. 343-355 - Chuang Ma:
A Congestion Control Protocol for Wireless Sensor Networks. 356-367 - Trong Nhan Le, Nguyen Tran Huu Nguyen, Tan-Phuong Vo, The-Duy Phan-Dinh, Hoang-Anh Pham:
Penalty Shutdown Mitigation in Wireless Sensor Networks Powered by Ambient Energy. 368-379 - Jian Wang, Xiaolin Xu, Xiaoming Hu, Wei Wayne Li:
On Forwarding Protocols in Linear Topology Wake-up Wireless Sensor Networks. 380-391 - Rajesh Kumar, Anurag Singh, Hocine Cherifi:
Effect of Topological Structure and Coupling Strength in Weighted Multiplex Networks. 392-403 - Yizhi Wu, Bingshuai Liu, Mingda Zhu:
A Single-Pair Antenna Microwave Medical Detection System Based on Unsupervised Feature Learning. 404-414 - Yanxia Pang, Liping Li, Wenan Tan, Yuanyuan Jin, Ying Zhang:
Forgetting Punished Recommendations for MOOC. 415-426 - Thomas H. Yang, Franklin Liu, Weiguo Yang, Hang Liu:
Internet Rurality: Developing an Index for Network Distance from Popular Internet Services. 427-436 - Alexander Semenov, Alexander Veremyev, Alexander G. Nikolaev, Eduardo L. Pasiliao, Vladimir Boginski:
Ranking Academic Advisors: Analyzing Scientific Advising Impact Using MathGenealogy Social Network. 437-449 - Jinzhong Li, Guanjun Liu:
A Rich Ranking Model Based on the Matthew Effect Optimization. 450-459 - Xiaoyan Kui, Junbin Liang, Huakun Du, Shaojun Zou, Zhixiong Liu:
A Load-Balanced and Low-Delay Data Collection for Wireless Sensor Networks. 460-476 - Feng Wang, Weidong Huang, Yuan Xu:
Research on Telecom Flow Operation Based on User Profile. 477-486 - Xiaoxia Zhu, Jiaxin Song, Jianfang Meng, Jia Liu:
Information Spreading in Social Network Through Explosive Percolation Theory. 487-497 - Tero Bodström, Timo Hämäläinen:
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory. 498-509 - Sanjay Kumar, Azfar Faizan, Ari Viinikainen, Timo Hämäläinen:
MLSPD - Machine Learning Based Spam and Phishing Detection. 510-522 - Kishor Datta Gupta, Dipankar Dasgupta, Sajib Sen:
Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents. 523-535
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.