Measuring message propagation and social influence on Twitter. com S Ye, SF Wu Social Informatics: Second International Conference, SocInfo 2010, Laxenburg …, 2010 | 434 | 2010 |
Crawling online social graphs S Ye, J Lang, F Wu 2010 12th International Asia-Pacific Web Conference, 236-242, 2010 | 176 | 2010 |
Distributed PageRank computation based on iterative aggregation-disaggregation methods Y Zhu, S Ye, X Li Proceedings of the 14th ACM international conference on Information and …, 2005 | 100 | 2005 |
Understanding current IPv6 performance: a measurement study Y Wang, S Ye, X Li 10th IEEE Symposium on Computers and Communications (ISCC'05), 71-76, 2005 | 85 | 2005 |
Template detection for large scale search engines L Chen, S Ye, X Li Proceedings of the 2006 ACM symposium on Applied computing, 1094-1098, 2006 | 76 | 2006 |
Noise injection for search privacy protection S Ye, F Wu, R Pandey, H Chen 2009 International Conference on Computational Science and Engineering 3, 1-8, 2009 | 70 | 2009 |
Estimating the size of online social networks S Ye, SF Wu International Journal of Social Computing and Cyber-Physical Systems 1 (2 …, 2011 | 42 | 2011 |
贵州岩溶山区生态系统的脆弱性及其对策 苏维词 中国水土保持科学 2 (3), 64-69, 2004 | 40* | 2004 |
A systematic study on parameter correlations in large-scale duplicate document detection S Ye, JR Wen, WY Ma Knowledge and Information Systems 14, 217-232, 2008 | 32 | 2008 |
Davis social links: integrating social networks with internet routing L Banks, S Ye, Y Huang, SF Wu Proceedings of the 2007 workshop on Large scale attack defense, 121-128, 2007 | 31 | 2007 |
Microsoft Research Asia at the Web Track of TREC 2003. JR Wen, R Song, D Cai, K Zhu, S Yu, S Ye, WY Ma TREC, 408-417, 2003 | 21 | 2003 |
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks DAS De Oliveira, JR Crandall, G Wassermann, S Ye, SF Wu, Z Su, ... NOMS 2008-2008 IEEE Network Operations and Management Symposium, 121-128, 2008 | 20 | 2008 |
Socialwiki: Bring order to wiki systems with social context H Zhao, S Ye, P Bhattacharyya, J Rowe, K Gribble, SF Wu Social Informatics: Second International Conference, SocInfo 2010, Laxenburg …, 2010 | 19 | 2010 |
Design and implementation of faith, an experimental system to intercept and manipulate online social informatics R Lee, R Nia, J Hsu, KN Levitt, J Rowe, SF Wu, S Ye 2011 International Conference on Advances in Social Networks Analysis and …, 2011 | 15 | 2011 |
Workload-aware Web crawling and server workload detection S Ye, G Lu, X Li Proceedings of the second Asia-Pacific advanced network research workshop …, 2004 | 13 | 2004 |
A query-dependent duplicate detection approach for large scale search engines S Ye, R Song, JR Wen, WY Ma Advanced Web Technologies and Applications: 6th Asia-Pacific Web Conference …, 2004 | 10 | 2004 |
Design and implementation of davis social links osn kernel T Tran, K Chan, S Ye, P Bhattacharyya, A Garg, X Lu, SF Wu Wireless Algorithms, Systems, and Applications: 4th International Conference …, 2009 | 8 | 2009 |
Error restricted fast MAP decoding of VLC M Jia, J Wen, S Ye, X Li IEEE communications letters 9 (10), 909-911, 2005 | 7 | 2005 |
Online social network measurements and search privacy protection S Ye University of California, Davis, 2010 | 4 | 2010 |
Putting trojans on the horns of a dilemma: Redundancy for information theft detection JR Crandall, J Brevik, S Ye, G Wassermann, DAS De Oliveira, Z Su, ... Transactions on Computational Science IV: Special Issue on Security in …, 2009 | 4 | 2009 |