×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of my-t
Guest Editorial: Computing and Combinatorics
212 views
IMMA applications to ion implantation in silicon-on-sapphire
214 views
Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment
213 views
Analysis of misinformation containment in online social networks
214 views
[ACM Press the 17th annual international conference - Las Vegas, Nevada, USA (2011.09.19-2011.09.23)] Proceedings of the 17th annual international conference on Mobile computing and
218 views
A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks
214 views
[IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Adaptive algorithms
212 views
[IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Sources of
214 views
Cost-Effective Viral Marketing for Time-Critical Campaigns in Large-Scale Social Networks
212 views
[IEEE MILCOM 2012 - 2012 IEEE Military Communications Conference - Orlando, FL, USA (2012.10.29-2012.11.1)] MILCOM 2012 - 2012 IEEE Military Communications Conference - Finding overlapped
213 views
[IEEE 2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC) - Scottsdale, AZ, USA (2009.12.14-2009.12.16)] 2009 IEEE 28th International Performance
215 views
[IEEE 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS) - Philadelphia, PA, USA (2013.07.8-2013.07.11)] 2013 IEEE 33rd International Conference on Distributed
218 views
[IEEE 2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC) - Scottsdale, AZ, USA (2009.12.14-2009.12.16)] 2009 IEEE 28th International Performance
212 views
Efficient Multi-Link Failure Localization Schemes in All-Optical Networks
214 views
Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis
213 views
[IEEE IEEE INFOCOM 2013 - IEEE Conference on Computer Communications - Turin, Italy (2013.04.14-2013.04.19)] 2013 Proceedings IEEE INFOCOM - An adaptive approximation algorithm for
213 views
[IEEE IEEE INFOCOM 2013 - IEEE Conference on Computer Communications - Turin, Italy (2013.04.14-2013.04.19)] 2013 Proceedings IEEE INFOCOM - Adaptive approximation algorithms for hole
214 views
[IEEE MILCOM 2010 - 2010 IEEE Military Communications Conference - San Jose, CA, USA (2010.10.31-2010.11.3)] 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE - A novel method
213 views
[IEEE 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) - China (2014.8.17-2014.8.20)] 2014 IEEE/ACM International Conference on Advances
217 views
[IEEE 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom) - Boston, MA, USA (2011.10.9-2011.10.11)]
213 views