Martin Harrigan

Orcid: 0000-0002-6069-7001

According to our database1, Martin Harrigan authored at least 22 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Emergent Outcomes of the veToken Model.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2021
Decentralisation over Privacy: An Analysis of the Bisq Trade Protocol.
Proceedings of the Euro-Par 2021: Parallel Processing Workshops, 2021

2020
The Bisq DAO: On the Privacy Cost of Participation.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2018
Airdrops and Privacy: A Case Study in Cross-Blockchain Analysis.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

2016
The Unreasonable Effectiveness of Address Clustering.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

2013
Characterizing ego-networks using motifs.
Netw. Sci., 2013

Reports on the Workshops Held at the Sixth International AAAI Conference on Weblogs and Social Media.
AI Mag., 2013

2012
Identifying Discriminating Network Motifs in YouTube Spam
CoRR, 2012

Classifying Wikipedia articles using network motif counts and ratios.
Proceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration, 2012

Network Analysis of Recurring YouTube Spam Campaigns.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Using Storm to Perform Dynamic Egocentric Network Motif Analysis.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

EgoNav: exploring networks through egocentric spatializations.
Proceedings of the International Working Conference on Advanced Visual Interfaces, 2012

2011
<i>k</i>-Level Crossing Minimization Is NP-Hard for Trees.
Proceedings of the WALCOM: Algorithms and Computation - 5th International Workshop, 2011

An Analysis of Anonymity in the Bitcoin System.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Mining Dense Structures to Uncover Anomalous Behaviour in Financial Network Data.
Proceedings of the Modeling and Mining Ubiquitous Social Media, 2011

Characterizing Wikipedia pages using edit network motif profiles.
Proceedings of the 3rd International CIKM Workshop on Search and Mining User-Generated Contents, 2011

2010
Using Vector Clocks to Visualize Communication Flow.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
What Do Academic Users Really Want from an Adaptive Learning System?.
Proceedings of the User Modeling, 2009

2008
Using a Significant Spanning Tree to Draw a Directed Graph.
J. Graph Algorithms Appl., 2008

2007
Practical Level Planarity Testing and Layout with Embedding Constraints.
Proceedings of the Graph Drawing, 15th International Symposium, 2007

Efficiently drawing a significant spanning tree of a directed graph.
Proceedings of the APVIS 2007, 2007

2005
On Layering Directed Acyclic Graphs.
Proceedings of the Graph Drawing, 8.-13. May 2005, 2005


  Loading...