暂无分享,去创建一个
[1] Zhu Han,et al. Energy-aware resource allocation for device-to-device underlay communication , 2013, 2013 IEEE International Conference on Communications (ICC).
[2] Ashwin Sampath,et al. Cell Association and Interference Coordination in Heterogeneous LTE-A Cellular Networks , 2010, IEEE Journal on Selected Areas in Communications.
[3] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[4] Wha Sook Jeon,et al. Resource allocation scheme for device-to-device communication for maximizing spatial reuse , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[5] Thang N. Dinh,et al. Cost-aware Targeted Viral Marketing in billion-scale networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[6] My T. Thai,et al. Cheap, easy, and massively effective viral marketing in social networks: truth or fiction? , 2012, HT '12.
[7] Nam P. Nguyen,et al. Containment of misinformation spread in online social networks , 2012, WebSci '12.
[8] Laks V. S. Lakshmanan,et al. CELF++: optimizing the greedy algorithm for influence maximization in social networks , 2011, WWW.
[9] Wei Chen,et al. Efficient influence maximization in social networks , 2009, KDD.
[10] Xu Chen,et al. Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.
[11] Tao Chen,et al. Effective Interference Cancellation Scheme for Device-to-Device Communication Underlaying Cellular Networks , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.
[12] My T. Thai,et al. Cost-Effective Viral Marketing for Time-Critical Campaigns in Large-Scale Social Networks , 2014, IEEE/ACM Transactions on Networking.
[13] Weili Wu,et al. Least Cost Rumor Blocking in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[14] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[15] Aravind Srinivasan,et al. Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.
[16] Sami Hakola,et al. The investigation of power control schemes for a device-to-device communication integrated into OFDMA cellular system , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[17] Wei Chen,et al. Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.
[18] Zaher Dawy,et al. Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.
[19] Stefan Parkvall,et al. Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.
[20] Visa Koivunen,et al. Interference-Aware Resource Allocation for Device-to-Device Radio Underlaying Cellular Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[21] Xiaokui Xiao,et al. Influence Maximization in Near-Linear Time: A Martingale Approach , 2015, SIGMOD Conference.
[22] Yiyang Pei,et al. Resource Allocation for Device-to-Device Communications Overlaying Two-Way Cellular Networks , 2013, IEEE Transactions on Wireless Communications.
[23] Laks V. S. Lakshmanan,et al. SIMPATH: An Efficient Algorithm for Influence Maximization under the Linear Threshold Model , 2011, 2011 IEEE 11th International Conference on Data Mining.
[24] Xiaokui Xiao,et al. Influence maximization: near-optimal time complexity meets practical efficiency , 2014, SIGMOD Conference.
[25] Olav Tirkkonen,et al. On the Performance of Device-to-Device Underlay Communication with Simple Power Control , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[26] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[27] Xiang Cheng,et al. Distributed resource allocation for device-to-device communications underlaying cellular networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[28] Sungsoo Park,et al. Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[29] Xuemin Shen,et al. Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.
[30] C.-H. Yu,et al. Power Optimization of Device-to-Device Communication Underlaying Cellular Communication , 2009, 2009 IEEE International Conference on Communications.
[31] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[32] Zhu Han,et al. Joint scheduling and resource allocation for device-to-device underlay communication , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[33] Zhu Han,et al. Optimal Base Station Scheduling for Device-to-Device Communication Underlaying Cellular Networks , 2016, IEEE Journal on Selected Areas in Communications.
[34] Nam P. Nguyen,et al. A novel method for worm containment on dynamic social networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[35] Christian Borgs,et al. Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.
[36] Jure Leskovec,et al. Learning to Discover Social Circles in Ego Networks , 2012, NIPS.
[37] Xiang Cheng,et al. Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach , 2012, IEEE Journal on Selected Areas in Communications.
[38] Kyomin Jung,et al. IRIE: Scalable and Robust Influence Maximization in Social Networks , 2011, 2012 IEEE 12th International Conference on Data Mining.
[39] Walid Saad,et al. Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications , 2016, IEEE Transactions on Wireless Communications.
[40] Olav Tirkkonen,et al. Resource Sharing Optimization for Device-to-Device Communication Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[41] Nam P. Nguyen,et al. Overlapping Community Structures and Their Detection on Social Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.