关注
Yajun Wang
Yajun Wang
在 microsoft.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Efficient influence maximization in social networks
W Chen, Y Wang, S Yang
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
27442009
Scalable influence maximization for prevalent viral marketing in large-scale social networks
W Chen, C Wang, Y Wang
Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010
21642010
Prominent features of rumor propagation in online social media
S Kwon, M Cha, K Jung, W Chen, Y Wang
2013 IEEE 13th international conference on data mining, 1103-1108, 2013
9902013
Combinatorial multi-armed bandit: General framework and applications
W Chen, Y Wang, Y Yuan
International conference on machine learning, 151-159, 2013
8202013
Influence maximization in social networks when negative opinions may emerge and propagate
W Chen, A Collins, R Cummings, T Ke, Z Liu, D Rincon, X Sun, Y Wang, ...
Proceedings of the 2011 siam international conference on data mining, 379-390, 2011
4582011
Scalable influence maximization for independent cascade model in large-scale social networks
C Wang, W Chen, Y Wang
Data Mining and Knowledge Discovery 25, 545-576, 2012
4092012
Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships
Y Li, W Chen, Y Wang, ZL Zhang
Proceedings of the sixth ACM international conference on Web search and data …, 2013
2602013
Combinatorial multi-armed bandit and its extension to probabilistically triggered arms
W Chen, Y Wang, Y Yuan, Q Wang
Journal of Machine Learning Research 17 (50), 1-33, 2016
2472016
A game-theoretic framework to identify overlapping communities in social networks
W Chen, Z Liu, X Sun, Y Wang
Data Mining and Knowledge Discovery 21, 224-240, 2010
2452010
Asymptotically optimal strategy-proof mechanisms for two-facility games
P Lu, X Sun, Y Wang, ZA Zhu
Proceedings of the 11th ACM conference on Electronic commerce, 315-324, 2010
1992010
Tighter bounds for facility games
P Lu, Y Wang, Y Zhou
Internet and Network Economics: 5th International Workshop, WINE 2009, Rome …, 2009
1282009
Influence assessment in social networks
W Chen, Y Wang, S Yang, C Wang
US Patent App. 12/790,075, 2011
992011
Two-sided online bipartite matching and vertex cover: Beating the greedy algorithm
Y Wang, SC Wong
Automata, Languages, and Programming: 42nd International Colloquium, ICALP …, 2015
952015
Complexity of data collection, aggregation, and selection for wireless sensor networks
XY Li, Y Wang, Y Wang
IEEE Transactions on computers 60 (3), 386-399, 2010
952010
Network topology inference based on end-to-end measurements
X Jin, WPK Yiu, SHG Chan, Y Wang
IEEE Journal on Selected areas in Communications 24 (12), 2182-2195, 2006
882006
Minimizing seed set selection with probabilistic coverage guarantee in a social network
P Zhang, W Chen, X Sun, Y Wang, J Zhang
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
842014
On maximizing tree bandwidth for topology-aware peer-to-peer streaming
X Jin, WPK Yiu, SHG Chan, Y Wang
IEEE transactions on multimedia 9 (8), 1580-1592, 2007
662007
Secretary problems: Laminar matroid and interval scheduling
S Im, Y Wang
Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete …, 2011
652011
Constant-work-space algorithms for geometric problems
T Asano, W Mulzer, G Rote, Y Wang
Journal of Computational Geometry 2 (1), 46–68-46–68, 2011
602011
Aspects of rumor spreading on a microblog network
S Kwon, M Cha, K Jung, W Chen, Y Wang
Social Informatics: 5th International Conference, SocInfo 2013, Kyoto, Japan …, 2013
552013
系统目前无法执行此操作,请稍后再试。
文章 1–20