Author of the publication

Information Cascades on Arbitrary Topologies.

, , , and . ICALP, volume 55 of LIPIcs, page 64:1-64:14. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compressed sensing for abnormal event detection in wireless networks., , , and . CHINACOM, page 16-20. IEEE Computer Society, (2011)Evaluation of MODIS Gross Primary Production across Multiple Biomes in China Using Eddy Covariance Flux Data., , , , and . Remote Sensing, 8 (5): 395 (2016)Towards cost-effective and low latency data center network architecture., , , , and . Computer Communications, (2016)A 128-Stage Analog Accumulator for CMOS TDI Image Sensor., , , , and . IEEE Trans. on Circuits and Systems, 61-I (7): 1952-1961 (2014)A Simultaneous Perturbation Approach for Solving Economic Dispatch Problems With Emission, Storage, and Network Constraints., , , , , and . IEEE Trans. Smart Grid, 4 (4): 2356-2363 (2013)The Q method for second order cone programming., and . Computers & OR, 35 (5): 1510-1538 (2008)Fabrication and characteristics of tunable band pass filter using MetalMumps technology., , , , , and . NEMS, page 249-253. IEEE, (2011)Extended Puma Algorithm for Multibaseline SAR Interferograms., , , and . IGARSS, page 2161-2164. IEEE, (2018)R2-M0PS0: A multi-objective particle swarm optimizer based on R2-indicator and decomposition., , , and . CEC, page 3148-3155. IEEE, (2015)The Honey Badger of BFT Protocols., , , , and . ACM Conference on Computer and Communications Security, page 31-42. ACM, (2016)