-
2
-
-
85036356967
-
-
D.J. Watts, Small Worlds (Princeton University Press, Princeton, 1999)
-
D.J. Watts, Small Worlds (Princeton University Press, Princeton, 1999).
-
-
-
-
5
-
-
85036270250
-
-
B. Bollobás, Random Graphs (Academic Press, London, 1985)
-
B. Bollobás, Random Graphs (Academic Press, London, 1985).
-
-
-
-
9
-
-
4243939794
-
-
D.S. Callaway, M.E.J. Newman, S.H. Strogatz, and D.J. Watts, Phys. Rev. Lett. 85, 5468 (2000).
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 5468
-
-
Callaway, D.S.1
Newman, M.E.J.2
Strogatz, S.H.3
Watts, D.J.4
-
10
-
-
0033721503
-
-
A. Broder, R. Kumar, F. Maghoul, P. Raghavan, S. Rajagopalan, R. Stata, A. Tomkins, and J. Wiener, Comput. Netw. 33, 309 (2000).
-
(2000)
Comput. Netw.
, vol.33
, pp. 309
-
-
Broder, A.1
Kumar, R.2
Maghoul, F.3
Raghavan, P.4
Rajagopalan, S.5
Stata, R.6
Tomkins, A.7
Wiener, J.8
-
12
-
-
0035896667
-
-
R. Cohen, K. Erez, D. ben-Avraham, and S. Havlin, Phys. Rev. Lett. 86, 3682 (2001).
-
(2001)
Phys. Rev. Lett.
, vol.86
, pp. 3682
-
-
Cohen, R.1
Erez, K.2
ben-Avraham, D.3
Havlin, S.4
-
13
-
-
0035799707
-
-
H. Jeong, S.P. Mason, A.-L. Barabási, and Z.N. Oltvai, Nature (London) 411, 41 (2001).
-
(2001)
Nature (London)
, vol.411
, pp. 41
-
-
Jeong, H.1
Mason, S.P.2
Barabási, A.-L.3
Oltvai, Z.N.4
-
15
-
-
41349120887
-
-
P. Holme, B.J. Kim, C.N. Yoon, and S.K. Han, Phys. Rev. E 65, 056109 (2002).
-
(2002)
Phys. Rev. E
, vol.65
, pp. 56109
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
20
-
-
85036257831
-
-
We choose to sort the links according to the initial distribution of ranges, instead of an updated distribution, because we want to address the relative importance of short-range and long-range links for the original network. In addition, in terms of attack efficiency, updating is time consuming
-
We choose to sort the links according to the initial distribution of ranges, instead of an updated distribution, because we want to address the relative importance of short-range and long-range links for the original network. In addition, in terms of attack efficiency, updating is time consuming.
-
-
-
-
22
-
-
85036173322
-
-
Indeed, the range of a link can be regarded as the length of the second shortest path between the nodes that are connected to the link. Since we are considering the semirandom model, for which everything other than the connectivity distribution is random, the length of the second shortest path should also be correlated with the product of connectivities
-
Indeed, the range of a link can be regarded as the length of the second shortest path between the nodes that are connected to the link. Since we are considering the semirandom model, for which everything other than the connectivity distribution is random, the length of the second shortest path should also be correlated with the product of connectivities.
-
-
-
-
23
-
-
85036239855
-
-
For pairs of nodes connected by (Formula presented) shortest paths, the contribution to the load due to each path is (Formula presented)
-
For pairs of nodes connected by (Formula presented) shortest paths, the contribution to the load due to each path is (Formula presented)
-
-
-
-
24
-
-
85036295238
-
-
this model, we start with N nodes and zero links. Then for each pair of nodes, with probability p, we add a link between them. The resulting network has on average (Formula presented) links per node
-
In this model, we start with N nodes and zero links. Then for each pair of nodes, with probability p, we add a link between them. The resulting network has on average (Formula presented) links per node.
-
-
-
-
25
-
-
85036265676
-
-
The same tendency displayed in Figs. 22 and 44 was observed for larger fractions of removed links. In particular, short-range attack is still the most effective one for scale-free networks with scaling exponent around 3. We observe, however, that the removed fraction shown in these figures is already unrealistically large for many practical situations
-
The same tendency displayed in Figs. 22 and 44 was observed for larger fractions of removed links. In particular, short-range attack is still the most effective one for scale-free networks with scaling exponent around 3. We observe, however, that the removed fraction shown in these figures is already unrealistically large for many practical situations.
-
-
-
-
26
-
-
85036193063
-
-
Reference 15 also considers local strategies of attack
-
Reference 15 also considers local strategies of attack.
-
-
-
-
27
-
-
0035927795
-
-
F. Liljeros, C.R. Edling, L.A.N. Amaral, H.E. Stanley, and Y. Aberg, Nature (London) 411, 907 (2001).
-
(2001)
Nature (London)
, vol.411
, pp. 907
-
-
Liljeros, F.1
Edling, C.R.2
Amaral, L.A.N.3
Stanley, H.E.4
Aberg, Y.5
|