<--- Back to Details
First PageDocument Content
Networks / Network theory / Graph theory / Graphical models / Distributed data storage / Binary trees
Date: 2017-10-04 00:46:11
Networks
Network theory
Graph theory
Graphical models
Distributed data storage
Binary trees

Accurate Path-based Methods for Influence Maximization in Social Networks Yun-Yong Ko Dong-Kyu Chae

Add to Reading List

Source URL: gdac.uqam.ca

Download Document from Source Website

File Size: 627,65 KB

Share Document on Facebook

Similar Documents

DATASHEET| 1 DATASHEET HEDVIG DISTRIBUTED STORAGE PLATFORM Hedvig’s software-defined storage solution provides the flexibility needed for rapidly changing data, application, and user requirements in private, hybrid, an

DATASHEET| 1 DATASHEET HEDVIG DISTRIBUTED STORAGE PLATFORM Hedvig’s software-defined storage solution provides the flexibility needed for rapidly changing data, application, and user requirements in private, hybrid, an

DocID: 1uRqj - View Document

BuildingDepot: An Extensible and Distributed Architecture for Building Data Storage, Access and Sharing Yuvraj Agarwal, Rajesh Gupta, Daisuke Komaki, Thomas Weng Department of Computer Science and Engineering, UCSD  {yuv

BuildingDepot: An Extensible and Distributed Architecture for Building Data Storage, Access and Sharing Yuvraj Agarwal, Rajesh Gupta, Daisuke Komaki, Thomas Weng Department of Computer Science and Engineering, UCSD {yuv

DocID: 1uuFR - View Document

Ceph Software Defined Storage Appliance Unified distributed data storage cluster with self-healing, auto-balancing and no single point of failure Lowest power consumption in the industry: 70% power saving Infinite Scale

Ceph Software Defined Storage Appliance Unified distributed data storage cluster with self-healing, auto-balancing and no single point of failure Lowest power consumption in the industry: 70% power saving Infinite Scale

DocID: 1utGb - View Document

DATABASE MANAGEMENT SYSTEMS SOLUTIONS MANUAL THIRD EDITION  Raghu Ramakrishnan

DATABASE MANAGEMENT SYSTEMS SOLUTIONS MANUAL THIRD EDITION Raghu Ramakrishnan

DocID: 1rsHj - View Document

Exercise 4: Extreme Democracy Task 1: Everyone Gets exactly one Vote. . . The goal of this exercise is to prove correct the asynchronous safe broadcast algorithm by Bracha. It tolerates f < n/3 Byzantine faults, so we wi

Exercise 4: Extreme Democracy Task 1: Everyone Gets exactly one Vote. . . The goal of this exercise is to prove correct the asynchronous safe broadcast algorithm by Bracha. It tolerates f < n/3 Byzantine faults, so we wi

DocID: 1rrE3 - View Document