-
3
-
-
0038483826
-
Emergence of scaling in random networks
-
A.-L. Barabási and R., Albert. Emergence of scaling in random networks. Science, 286:509-512, 1999.
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
4
-
-
4544345134
-
Approximating the reed-frost epidemic process
-
A.D. Barbour and S. Utev. Approximating the reed-frost epidemic process. Stock. Proc. Applications, 113:173-197, 2004.
-
(2004)
Stock. Proc. Applications
, vol.113
, pp. 173-197
-
-
Barbour, A.D.1
Utev, S.2
-
5
-
-
11944253901
-
-
Cambridge University Press
-
B. Bollobás. Random Graphs. Cambridge University Press, 2001.
-
(2001)
Random Graphs
-
-
Bollobás, B.1
-
6
-
-
2542530739
-
The diameter of a scale-free random graph
-
B. Bollobas and O. Riordan. The diameter of a scale-free random graph. Combinatorica, 4:5-34, 2004.
-
(2004)
Combinatorica
, vol.4
, pp. 5-34
-
-
Bollobas, B.1
Riordan, O.2
-
7
-
-
0038763983
-
Connected components in random graphs with given degree sequences
-
F. Chung and L. Lu. Connected components in random graphs with given degree sequences. Annals of Combinatorics, 6:125-145, 2002.
-
(2002)
Annals of Combinatorics
, vol.6
, pp. 125-145
-
-
Chung, F.1
Lu, L.2
-
8
-
-
84906264352
-
The average distances in random graphs with given expected degrees
-
F. Chung and L. Lu. The average distances in random graphs with given expected degrees. Internet Mathematics, 1:91-114, 2003.
-
(2003)
Internet Mathematics
, vol.1
, pp. 91-114
-
-
Chung, F.1
Lu, L.2
-
9
-
-
0038087282
-
Eigenvalues of random power law graphs
-
F. Chung, L. Lu, and V. Vu. Eigenvalues of random power law graphs. Annals of Combinatorics, 7:21-33, 2003.
-
(2003)
Annals of Combinatorics
, vol.7
, pp. 21-33
-
-
Chung, F.1
Lu, L.2
Vu, V.3
-
10
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
M. Costa, M. Castro, J. Crowcroft, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of internet worms. Proc. SOSP, 2005.
-
(2005)
Proc. SOSP
-
-
Costa, M.1
Castro, M.2
Crowcroft, J.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
11
-
-
0001847481
-
On the evolution of random graphs
-
P. Erdös and A. Rényi. On the evolution of random graphs. Mat Kutato Int. Közl, 5:17-60, 1960.
-
(1960)
Mat Kutato Int. Közl
, vol.5
, pp. 17-60
-
-
Erdös, P.1
Rényi, A.2
-
14
-
-
34748856049
-
-
S. Janson, T. Luczak, and A. Ruciriski. Random Graphs. Wiley-Interscience in Discrete Mathematics and Opimization, 2000.
-
S. Janson, T. Luczak, and A. Ruciriski. Random Graphs. Wiley-Interscience in Discrete Mathematics and Opimization, 2000.
-
-
-
-
15
-
-
0000998185
-
A contribution to the mathematical theory of epidemics
-
W. O. Kermack and A. G. Mc-Kendrick. A contribution to the mathematical theory of epidemics. Proc. Roy. Soc. Lond. A, 115:700-721, 1927.
-
(1927)
Proc. Roy. Soc. Lond. A
, vol.115
, pp. 700-721
-
-
Kermack, W.O.1
Mc-Kendrick, A.G.2
-
16
-
-
0001107279
-
Poisson approximation for the final state of a generalized epidemic process
-
C. Lefevre and S. Utev. Poisson approximation for the final state of a generalized epidemic process. Annals of Probability, 23(3):1139-1162, 1995.
-
(1995)
Annals of Probability
, vol.23
, Issue.3
, pp. 1139-1162
-
-
Lefevre, C.1
Utev, S.2
-
17
-
-
84990671447
-
A critical point for random graphs with a given degree sequence
-
M. Molloy and B. A. Reed. A critical point for random graphs with a given degree sequence. Random Structures and Algorithms, 6:161-180, 1995.
-
(1995)
Random Structures and Algorithms
, vol.6
, pp. 161-180
-
-
Molloy, M.1
Reed, B.A.2
-
18
-
-
0032286776
-
The size of the largest component of a, random graph on a fixed degree sequence
-
M. Molloy and B. A. Reed. The size of the largest component of a, random graph on a fixed degree sequence. Combinatorics, Probability and Computing, 7:295-306, 1998.
-
(1998)
Combinatorics, Probability and Computing
, vol.7
, pp. 295-306
-
-
Molloy, M.1
Reed, B.A.2
-
20
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
M. M. Williamson. Throttling viruses: restricting propagation to defeat malicious mobile code. ACSAC, 2002.
-
(2002)
ACSAC
-
-
Williamson, M.M.1
|