Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twitter in academic events: A study of temporal usage, communication, sentimental and topical patterns in 16 Computer Science conferences., , , , , and . Computer Communications, (2016)The Study of Secure E-Will System on the Internet., and . J. Inf. Sci. Eng., 25 (3): 877-893 (2009)JAM: Joint Action Matrix Factorization for Summarizing a Temporal Heterogeneous Social Network., , and . ICWSM, The AAAI Press, (2009)The Splog Detection Task and A Solution Based on Temporal and Link Properties., , , , , , , , , and . TREC, Special Publication 500-272, National Institute of Standards and Technology (NIST), (2006)ContexTour: Contextual Contour Analysis on Dynamic Multi-relational Clustering., , , and . SDM, page 418-429. SIAM, (2010)Temporal patterns in social media streams: Theme discovery and evolution using joint analysis of content and context., , , and . ICME, page 1456-1459. IEEE, (2009)What Makes Hyper-local Online Discussion Forums Sustainable?, , and . HICSS, page 2445-2454. IEEE Computer Society, (2015)Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing., and . SUTC (1), page 520-529. IEEE Computer Society, (2006)Blog Community Discovery and Evolution Based on Mutual Awareness Expansion., , , , and . Web Intelligence, page 48-56. IEEE Computer Society, (2007)EigenTransitions with Hypothesis Testing: The Anatomy of Urban Mobility., , and . ICWSM, page 486-495. AAAI Press, (2016)