-
1
-
-
77953295094
-
Analyzing the Internet collapse
-
Feb. [Online]. Available
-
J. Borland, "Analyzing the Internet collapse," MIT Technology Review, Feb. 2008. [Online]. Available: http://www.technologyreview.com/ Infotech/20152/?a=f
-
(2008)
MIT Technology Review
-
-
Borland, J.1
-
2
-
-
82855161719
-
-
Apr.
-
J. S. Foster, E. Gjelde, W. R. Graham, R. J. Hermann, H. M. Kluepfel, R. L. Lawson, G. K. Soper, L. L. Wood, and J. B. Woodard, "Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack, critical national infrastructures," Apr. 2008.
-
(2008)
Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, Critical National Infrastructures
-
-
Foster, J.S.1
Gjelde, E.2
Graham, W.R.3
Hermann, R.J.4
Kluepfel, H.M.5
Lawson, R.L.6
Soper, G.K.7
Wood, L.L.8
Woodard, J.B.9
-
3
-
-
63549104205
-
High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments
-
[Online]. Available
-
C. Wilson, "High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments," CRS Report for Congress, July 2008. [Online]. Available: http://www.ntia.doc.gov/ broadbandgrants/comments/7926.pdf
-
CRS Report for Congress, July 2008
-
-
Wilson, C.1
-
6
-
-
62349108771
-
Assessing the impact of geographically correlated network failures
-
S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the impact of geographically correlated network failures," in Proc. IEEE MILCOM, Nov. 2008.
-
Proc. IEEE MILCOM, Nov. 2008
-
-
Neumayer, S.1
Zussman, G.2
Cohen, R.3
Modiano, E.4
-
9
-
-
0032164214
-
Analysis of the greedy approach in problems of maximum k-coverage
-
D. Hochbaum and A. Pathria, "Analysis of the greedy approach in problems of maximum k-coverage," Naval Research Logistics (NRL), vol. 45, no. 6, pp. 615-627, 1998.
-
(1998)
Naval Research Logistics (NRL)
, vol.45
, Issue.6
, pp. 615-627
-
-
Hochbaum, D.1
Pathria, A.2
-
12
-
-
0034205406
-
Protection interoperability for WDM optical networks
-
O. Crochat, J.-Y. Le Boudec, and O. Gerstel, "Protection interoperability for WDM optical networks," IEEE/ACM Trans. Netw., vol. 8, no. 3, pp. 384-395, 2000.
-
(2000)
IEEE/ACM Trans. Netw.
, vol.8
, Issue.3
, pp. 384-395
-
-
Crochat, O.1
Le Boudec, J.-Y.2
Gerstel, O.3
-
13
-
-
6944229536
-
Physical topology design for survivable routing of logical rings in WDM-based networks
-
Oct.
-
A. Narula-Tam, E. Modiano, and A. Brzezinski, "Physical topology design for survivable routing of logical rings in WDM-based networks," IEEE J. Sel. Areas Commun., vol. 22, no. 8, pp. 1525-1538, Oct. 2004.
-
(2004)
IEEE J. Sel. Areas Commun.
, vol.22
, Issue.8
, pp. 1525-1538
-
-
Narula-Tam, A.1
Modiano, E.2
Brzezinski, A.3
-
14
-
-
0004298302
-
-
November Internet Draft. [Online]. Available
-
IETF Internet Working Group , "Inference of Shared Risk Link Groups," November 2001, Internet Draft. [Online]. Available: http://tools.ietf.org/html/draft-many-inference-srlg-02
-
(2001)
Inference of Shared Risk Link Groups
-
-
-
15
-
-
70349727170
-
Some generalized max-flow min-cut problems in the plane
-
D. Bienstock, "Some generalized max-flow min-cut problems in the plane," Math. Oper. Res., vol. 16, no. 2, pp. 310-333, 1991.
-
(1991)
Math. Oper. Res.
, vol.16
, Issue.2
, pp. 310-333
-
-
Bienstock, D.1
-
16
-
-
79951661234
-
Resilient routing layers for network disaster planning
-
Springer-Verlag, Apr.
-
A. F. Hansen, A. Kvalbein, T. Cicic, and S. Gjessing, "Resilient routing layers for network disaster planning," in Proc. ICN. Springer-Verlag, Apr. 2005.
-
(2005)
Proc. ICN
-
-
Hansen, A.F.1
Kvalbein, A.2
Cicic, T.3
Gjessing, S.4
-
17
-
-
79951651475
-
Dynamic load balancing for robust distributed computing in the presence of topological impairments
-
M. M. Hayat, J. E. Pezoa, D. Dietz, and S. Dhakal, "Dynamic load balancing for robust distributed computing in the presence of topological impairments," Wiley Handbook of Science and Technology for Homeland Security, 2009.
-
(2009)
Wiley Handbook of Science and Technology for Homeland Security
-
-
Hayat, M.M.1
Pezoa, J.E.2
Dietz, D.3
Dhakal, S.4
-
18
-
-
65849306397
-
The structure of electrical networks: A graph theory-based analysis
-
K. Atkins, J. Chen, V. S. A. Kumar, and A. Marathe, "The structure of electrical networks: a graph theory-based analysis," Int. J. Critical Infrastructures, vol. 5, no. 3, pp. 265-284, 2009.
-
(2009)
Int. J. Critical Infrastructures
, vol.5
, Issue.3
, pp. 265-284
-
-
Atkins, K.1
Chen, J.2
Kumar, V.S.A.3
Marathe, A.4
-
20
-
-
84888788464
-
A decomposition-based pseudoapproximation algorithm for network flow inhibition
-
Springer, ch. 3
-
C. Burch, R. Carr, S. Krumke, M. Marathe, C. Phillips, and E. Sundberg, "A decomposition-based pseudoapproximation algorithm for network flow inhibition," in Network Interdiction and Stochastic Integer Programming. Springer, 2003, ch. 3, pp. 51-68.
-
(2003)
Network Interdiction and Stochastic Integer Programming
, pp. 51-68
-
-
Burch, C.1
Carr, R.2
Krumke, S.3
Marathe, M.4
Phillips, C.5
Sundberg, E.6
-
21
-
-
33745153137
-
On the history of combinatorial optimization (till 1960)
-
Elsevier
-
A. Schrijver, "On the history of combinatorial optimization (till 1960)," in Handbook of Discrete Optimization. Elsevier, 2005, pp. 1-68.
-
(2005)
Handbook of Discrete Optimization
, pp. 1-68
-
-
Schrijver, A.1
-
23
-
-
26044461304
-
Identifying critical infrastructure: The median and covering facility interdiction problems
-
R. L. Church, M. P. Scaparra, and R. S. Middleton, "Identifying critical infrastructure: the median and covering facility interdiction problems," Ann. Assoc. Amer. Geographers, vol. 94, no. 3, pp. 491-502, 2004.
-
(2004)
Ann. Assoc. Amer. Geographers
, vol.94
, Issue.3
, pp. 491-502
-
-
Church, R.L.1
Scaparra, M.P.2
Middleton, R.S.3
-
24
-
-
0035896667
-
Breakdown of the Internet under intentional attack
-
Apr.
-
R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin, "Breakdown of the Internet under intentional attack," Phys. Rev. Lett., vol. 86, no. 16, pp. 3682-3685, Apr. 2001.
-
(2001)
Phys. Rev. Lett.
, vol.86
, Issue.16
, pp. 3682-3685
-
-
Cohen, R.1
Erez, K.2
Ben-Avraham, D.3
Havlin, S.4
-
25
-
-
0042025141
-
Tearing down the Internet
-
Aug.
-
D. Magoni, "Tearing down the Internet," IEEE J. Sel. Areas Commun., vol. 21, no. 6, pp. 949-960, Aug. 2003.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.6
, pp. 949-960
-
-
Magoni, D.1
-
26
-
-
0038483826
-
Emergence of scaling in random networks
-
October
-
A. L. Barabasi and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509-512, October 1999.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, A.L.1
Albert, R.2
-
29
-
-
84877640396
-
Stabbing convex polygons with a segment or a polygon
-
P. K. Agarwal, D. Z. Chen, S. K. Ganjugunte, E. Misiołek, M. Sharir, and K. Tang, "Stabbing convex polygons with a segment or a polygon," in Proc. ESA, Sept. 2008.
-
Proc. ESA, Sept. 2008
-
-
Agarwal, P.K.1
Chen, D.Z.2
Ganjugunte, S.K.3
Misiołek, E.4
Sharir, M.5
Tang, K.6
|