-
1
-
-
37349097109
-
Comparative approaches for assessing network vulnerability
-
January
-
Tony H. Grubesic, Timothy C. Matisziw, Alan T. Murray, and Diane Snediker. Comparative approaches for assessing network vulnerability. International Regional Science Review, 31(1):88-112, January 2008.
-
(2008)
International Regional Science Review
, vol.31
, Issue.1
, pp. 88-112
-
-
Grubesic, T.H.1
Matisziw, T.C.2
Murray, A.T.3
Snediker, D.4
-
2
-
-
26044461304
-
Identifying critical infrastructure: The median and covering facility interdiction problems
-
R. Church, M. Scaparra, and R. Middleton. Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr, 94(3):491-502, 2004.
-
(2004)
Ann Assoc Am Geogr
, vol.94
, Issue.3
, pp. 491-502
-
-
Church, R.1
Scaparra, M.2
Middleton, R.3
-
3
-
-
67349200138
-
Multimethodological approaches to network vulnerability analysis
-
A. Murray, T. Matisziw, and T. Grubesic. Multimethodological approaches to network vulnerability analysis. Growth Change, 2008.
-
(2008)
Growth Change
-
-
Murray, A.1
Matisziw, T.2
Grubesic, T.3
-
4
-
-
33746192198
-
A graph-theoretic perspective on centrality
-
October
-
Stephen P. Borgatti and Martin G. Everett. A graph-theoretic perspective on centrality. Social Networks, 28(4):466-484, October 2006.
-
(2006)
Social Networks
, vol.28
, Issue.4
, pp. 466-484
-
-
Borgatti, S.P.1
Everett, M.G.2
-
5
-
-
84883856631
-
Partitioning avoidance in mobile ad hoc networks using network survivability concepts
-
D. Goyal and J. Caffery. Partitioning avoidance in mobile ad hoc networks using network survivability concepts. 7th IEEE Symp. on Compu. and Comm. 2002.
-
7th IEEE Symp. on Compu. and Comm. 2002
-
-
Goyal, D.1
Caffery, J.2
-
10
-
-
33645330416
-
Dragon: A framework for service provisioning in heterogeneous grid networks
-
T. Lehman, J. Sobieski, and B. Jabbari. Dragon: a framework for service provisioning in heterogeneous grid networks. IEEE Comm. Magazines, 2006.
-
(2006)
IEEE Comm. Magazines
-
-
Lehman, T.1
Sobieski, J.2
Jabbari, B.3
-
12
-
-
0031176702
-
A simple min-cut algorithm
-
M. Stoer and F. Wagner. A simple min-cut algorithm. J. ACM, 1997.
-
(1997)
J. ACM
-
-
Stoer, M.1
Wagner, F.2
-
14
-
-
29844440416
-
On the hardness of approximating minimum vertex cover
-
I. Dinur and S. Safra. On the hardness of approximating minimum vertex cover. Annals of Mathematics, 162:2005, 2004.
-
(2004)
Annals of Mathematics
, vol.162
, pp. 2005
-
-
Dinur, I.1
Safra, S.2
-
15
-
-
34848857660
-
O(log n) approximation algorithms for min uncut, min 2cnf deletion, and directed cut problems
-
New York, NY, USA
-
A. Agarwal, M. Charikar, K. Makarychev, and Y. Makarychev. O(log n) approximation algorithms for min uncut, min 2cnf deletion, and directed cut problems. In STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, pages 573-581, New York, NY, USA, 2005.
-
(2005)
STOC '05: Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing
, pp. 573-581
-
-
Agarwal, A.1
Charikar, M.2
Makarychev, K.3
Makarychev, Y.4
-
16
-
-
0001545727
-
Divide-and-conquer approximation algorithms via spreading metrics
-
G. Even, J. S. Naor, S. Rao, and B. Schieber. Divide-and-conquer approximation algorithms via spreading metrics. Journal of ACM, 47(4):585-616, 2000.
-
(2000)
Journal of ACM
, vol.47
, Issue.4
, pp. 585-616
-
-
Even, G.1
Naor, J.S.2
Rao, S.3
Schieber, B.4
-
17
-
-
4544250512
-
Expander flows, geometric embeddings and graph partitioning
-
New York, NY, USA
-
S. Arora, S. Rao, and U. Vazirani. Expander flows, geometric embeddings and graph partitioning. In STOC '04: Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, pages 222-231, New York, NY, USA, 2004.
-
(2004)
STOC '04: Proceedings of the Thirty-sixth Annual ACM Symposium on Theory of Computing
, pp. 222-231
-
-
Arora, S.1
Rao, S.2
Vazirani, U.3
-
18
-
-
0033340828
-
Fast approximate graph partitioning algorithms
-
G. Even, J. S. Naor, S. Rao, and B. Schieber. Fast approximate graph partitioning algorithms. In SIAM Journal on Computing, pages 639-648, 1999.
-
(1999)
SIAM Journal on Computing
, pp. 639-648
-
-
Even, G.1
Naor, J.S.2
Rao, S.3
Schieber, B.4
-
19
-
-
10044223607
-
Techniques from combinatorial approximation algorithms yield efficient algorithms for random 2ksat
-
A. Coja-Oghlan, A. Goerdt, A. Lanka, and F. Schädlich. Techniques from combinatorial approximation algorithms yield efficient algorithms for random 2ksat. Theor. Comput. Sci., 329(1-3):1-45, 2004.
-
(2004)
Theor. Comput. Sci.
, vol.329
, Issue.1-3
, pp. 1-45
-
-
Coja-Oghlan, A.1
Goerdt, A.2
Lanka, A.3
Schädlich, F.4
-
20
-
-
57649214058
-
Detecting critical nodes in sparse graphs
-
A. Arulselvan, C. W. Commander, L. Elefteriadou, and P. M. Pardalos. Detecting critical nodes in sparse graphs. Comput. Oper. Res., 36(7):2193-2200, 2009.
-
(2009)
Comput. Oper. Res.
, vol.36
, Issue.7
, pp. 2193-2200
-
-
Arulselvan, A.1
Commander, C.W.2
Elefteriadou, L.3
Pardalos, P.M.4
-
21
-
-
33646385629
-
Identifying sets of key players in a social network
-
S. P. Borgatti. Identifying sets of key players in a social network. Comput. Math. Organiz. Theor., 12:21-34, 2006
-
(2006)
Comput. Math. Organiz. Theor.
, vol.12
, pp. 21-34
-
-
Borgatti, S.P.1
-
22
-
-
74549171036
-
On pairwise connectivity of wireless multihop networks
-
F. Sun and M. A. Shayman On pairwise connectivity of wireless multihop networks Inter. J. Security and Networks, 2(2) 37-49, 2007
-
(2007)
Inter. J. Security and Networks
, vol.2
, Issue.2
, pp. 37-49
-
-
Sun, F.1
Shayman, M.A.2
-
23
-
-
77953319756
-
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
-
T. N. Dinh, Y. Xuan, M. T. Thai, E. K. Park and T. Znati On New Approaches of Assessing Network Vulnerability: Hardness and Approximation. Manuscript, 2009.
-
(2009)
Manuscript
-
-
Dinh, T.N.1
Xuan, Y.2
Thai, M.T.3
Park, E.K.4
Znati, T.5
|