Battling the internet water army: Detection of hidden paid posters C Chen, K Wu, V Srinivasan, X Zhang 2013 IEEE/ACM International Conference on Advances in Social Networks …, 2013 | 275 | 2013 |
K-core decomposition of large networks on a single PC W Khaouid, M Barsky, V Srinivasan, A Thomo Proceedings of the VLDB Endowment 9 (1), 13-23, 2015 | 231 | 2015 |
Are bitvectors optimal? H Buhrman, PB Miltersen, J Radhkrishnan, S Venkatesh SIAM Journal on Computing 31 (6), 1723-1744, 2002 | 151 | 2002 |
Computing k-regret minimizing sets S Chester, A Thomo, S Venkatesh, S Whitesides Proceedings of the VLDB Endowment 7 (5), 389-400, 2014 | 89 | 2014 |
Lower bounds for predecessor searching in the cell probe model P Sen, S Venkatesh Journal of Computer and System Sciences 74 (3), 364-385, 2008 | 83* | 2008 |
Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes S Chester, BM Kapron, G Ramesh, G Srivastava, A Thomo, S Venkatesh Social Network Analysis and Mining 3, 381-399, 2013 | 71 | 2013 |
Complexity of social network anonymization S Chester, BM Kapron, G Srivastava, S Venkatesh Social Network Analysis and Mining 3 (2), 151-166, 2013 | 66 | 2013 |
Efficient computation of feedback arc set at web-scale M Simpson, V Srinivasan, A Thomo Proceedings of the VLDB Endowment 10 (3), 133-144, 2016 | 55 | 2016 |
On the advantage over a random assignment J Håstad, S Venkatesh Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002 | 54 | 2002 |
k-Anonymization of Social Networks by Vertex Addition. S Chester, BM Kapron, G Ramesh, G Srivastava, A Thomo, S Venkatesh ADBIS (2) 789, 107-116, 2011 | 44 | 2011 |
Conflict-aware weighted bipartite b-matching and its application to e-commerce C Chen, L Zheng, V Srinivasan, A Thomo, K Wu, A Sukow IEEE Transactions on Knowledge and Data Engineering 28 (6), 1475-1488, 2016 | 43 | 2016 |
Social network anonymization via edge addition B Kapron, G Srivastava, S Venkatesh 2011 International Conference on Advances in Social Networks Analysis and …, 2011 | 41 | 2011 |
The communication complexity of pointer chasing SJ Ponzio, J Radhakrishnan, S Venkatesh Journal of Computer and System Sciences 62 (2), 323-355, 2001 | 41 | 2001 |
Anonymizing subsets of social networks with degree constrained subgraphs S Chester, J Gaertner, U Stege, S Venkatesh 2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012 | 33 | 2012 |
Approximating the radii of point sets K Varadarajan, S Venkatesh, Y Ye, J Zhang SIAM Journal on Computing 36 (6), 1764-1776, 2007 | 33* | 2007 |
Visibly pushdown transducers for approximate validation of streaming XML A Thomo, S Venkatesh, YY Ye Foundations of Information and Knowledge Systems: 5th International …, 2008 | 32 | 2008 |
Improved bounds for dictionary look-up with one error GS Brodal, S Venkatesh Information Processing Letters 75 (1-2), 57-59, 2000 | 32 | 2000 |
SCC++: Predicting the programming language of questions and snippets of Stack Overflow K Alrashedy, D Dharmaretnam, DM German, V Srinivasan, TA Gulliver Journal of Systems and Software 162, 110505, 2020 | 30* | 2020 |
Restricted linear congruences K Bibak, BM Kapron, V Srinivasan, R Tauraso, L Tóth Journal of Number Theory 171, 128-144, 2017 | 28 | 2017 |
Clearing contamination in large networks M Simpson, V Srinivasan, A Thomo IEEE Transactions on Knowledge and Data Engineering 28 (6), 1435-1448, 2016 | 27 | 2016 |