Name
Papers
Collaborators
PALASH DEY
37
26
Citations 
PageRank 
Referers 
38
13.36
36
Referees 
References 
361
346
Search Limit
100361
Title
Citations
PageRank
Year
How Hard is Safe Bribery?00.342022
Priced Gerrymandering.00.342022
Distance restricted manipulation in voting00.342021
Network Robustness via Global k-cores00.342021
Predicting winner and estimating margin of victory in elections using sampling00.342021
Local Distance Constrained Bribery In Voting00.342021
Fair Partitioning of Public Resources: Redrawing District Boundary to Minimize Spatial Inequality in School Funding00.342021
On the complexity of Winner Verification and Candidate Winner for Multiwinner Voting Rules00.342020
Manipulating Node Similarity Measures in Network00.342020
A Parameterized Perspective On Protecting Elections00.342019
The Social Network Effect on Surprise in Elections.10.352019
Local Distance Restricted Bribery in Voting.00.342019
Testing Preferential Domains Using Sampling.00.342019
Covert Networks: How Hard is It to Hide?00.342019
Surprise in Elections.00.342018
Manipulative elicitation – A new attack on elections with incomplete preferences00.342018
Query Complexity of Tournament Solutions.00.342017
On the Exact Amount of Missing Information that makes Finding Possible Winners Hard.30.392017
Proportional Representation in Vote Streams.20.372017
Resolving the Complexity of Some Fundamental Problems in Computational Social Choice.00.342017
Parameterized Dichotomy of Choosing Committees Based on Approval Votes in the Presence of Outliers.30.392017
Recognizing and Eliciting Weakly Single Crossing Profiles on Trees.00.342016
Preference Elicitation For Single Crossing Domain.40.422016
Kernelization complexity of Possible Winner and Coalitional Manipulation problems in voting40.512016
Complexity of Manipulation with Partial Information in Voting.20.382016
Elicitation for Preferences Single Peaked on Trees.20.372016
Fishing out Winners from Vote Streams10.362015
Frugal Bribery in Voting.70.452015
Estimating the Margin of Victory of an Election using Sampling30.382015
On Choosing Committees Based on Approval Votes in the Presence of Outliers10.362015
Manipulation is Harder with Incomplete Votes.00.342015
UNO Gets Easier for a Single Player.00.342014
Complexity of Kernelization in the Possible Winner Problem.00.342014
Detecting Possible Manipulators in Elections.10.442014
Asymptotic collusion-proofness of voting rules: the case of large number of candidates30.382014
Asymptotic Collusion-proofness of Voting Rules when the Number of Candidates is Large00.342013
Dynamic multipath bandwidth provisioning with jitter, throughput, SLA constraints in MPLS over WDM network10.372010