Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Nash Equilibria in Generalized Interdependent Security Games., and . NIPS, page 2735-2743. (2014)Provision-After-Wait with Common Preferences., , and . ACM Trans. Economics and Comput., 5 (2): 12:1-12:36 (2017)Truthful Multi-unit Procurements with Budgets., and . WINE, volume 8877 of Lecture Notes in Computer Science, page 89-105. Springer, (2014)Evidence From the Past: AI Decision Aids to Improve Housing Systems for Homeless Youth., , , , and . AAAI Fall Symposia, page 149-157. AAAI Press, (2017)Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective., , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 1106-1122. Springer, (2019)Where Graph Topology Matters: The Robust Subgraph Problem., , and . CoRR, (2015)From Empirical Analysis to Public Policy: Evaluating Housing Systems for Homeless Youth., , , , and . ECML/PKDD (3), volume 11053 of Lecture Notes in Computer Science, page 69-85. Springer, (2018)External Evaluation of Topic Models: A Graph Mining Approach., and . ICDM, page 973-978. IEEE Computer Society, (2013)Computing Nash Equilibrium in Interdependent Defense Games., and . AAAI, page 842-850. AAAI Press, (2015)Preferences Single-Peaked on a Tree: Multiwinner Elections and Structural Results., , , and . J. Artif. Intell. Res., (2022)