-
1
-
-
68749092005
-
Stabbing convex polygons with a segment or a polygon
-
Sep.
-
P. K. Agarwal, D. Z. Chen, S. K. Ganjugunte, E. Misiołek, M. Sharir, and K. Tang, "Stabbing convex polygons with a segment or a polygon,"in Proc. ESA, Sep. 2008.
-
(2008)
Proc. ESA
-
-
Agarwal, P.K.1
Chen, D.Z.2
Ganjugunte, S.K.3
Misiołek, E.4
Sharir, M.5
Tang, K.6
-
2
-
-
79951617247
-
Network vulnerability to single, multiple, and probabilistic physical attacks
-
Nov.
-
P. K. Agarwal, A. Efrat, S. K. Ganjugunte, D. Hay, S. Sankararaman, and G. Zussman, "Network vulnerability to single, multiple, and probabilistic physical attacks,"in Proc. MILCOM, Nov. 2010.
-
(2010)
Proc. MILCOM
-
-
Agarwal, P.K.1
Efrat, A.2
Ganjugunte, S.K.3
Hay, D.4
Sankararaman, S.5
Zussman, G.6
-
3
-
-
80052342411
-
-
Columbia University, Electrical Engineering, Tech. Rep. 2010-07-25, July 2010. [Online]. Available
-
-, "The resilience of WDM networks to probabilistic geographical failures,"Columbia University, Electrical Engineering, Tech. Rep. 2010-07-25, July 2010. [Online]. Available: http://www.cs.huji.ac.il/-dhay/ publications/CU-EE-2010-07-25.pdf
-
The Resilience of WDM Networks to Probabilistic Geographical Failures
-
-
Agarwal, P.K.1
Efrat, A.2
Ganjugunte, S.K.3
Hay, D.4
Sankararaman, S.5
Zussman, G.6
-
4
-
-
0033902897
-
Computing the arrangement of curve segments: Divide-and-conquer algorithms via sampling
-
N. M. Amato, M. T. Goodrich, and E. A. Ramos, "Computing the arrangement of curve segments: divide-and-conquer algorithms via sampling,"in Proc. ACM-SIAM SODA, 2000.
-
(2000)
Proc. ACM-SIAM SODA
-
-
Amato, N.M.1
Goodrich, M.T.2
Ramos, E.A.3
-
5
-
-
20744455809
-
On approximating the depth and related problems
-
Jan.
-
B. Aronov and S. Har-Peled, "On approximating the depth and related problems,"in Proc. ACM-SIAM SODA, Jan. 2005.
-
(2005)
Proc. ACM-SIAM SODA
-
-
Aronov, B.1
Har-Peled, S.2
-
7
-
-
70349727170
-
Some generalized max-flow min-cut problems in the plane
-
D. Bienstock, "Some generalized max-flow min-cut problems in the plane,"Math. Oper. Res., vol. 16, no. 2, pp. 310-333, 1991.
-
(1991)
Math. Oper. Res.
, vol.16
, Issue.2
, pp. 310-333
-
-
Bienstock, D.1
-
8
-
-
77953295094
-
Analyzing the Internet collapse
-
Feb. [Online]. Available
-
J. Borland, "Analyzing the Internet collapse,"MIT Technology Review, Feb. 2008. [Online]. Available: http://www.technologyreview.com/ Infotech/20152/?a=f
-
(2008)
MIT Technology Review
-
-
Borland, J.1
-
9
-
-
26044461304
-
Identifying critical infrastructure: The median and covering facility interdiction problems
-
R. L. Church, M. P. Scaparra, and R. S. Middleton, "Identifying critical infrastructure: the median and covering facility interdiction problems,"Ann. Assoc. Amer. Geographers, vol. 94, no. 3, pp. 491-502, 2004.
-
(2004)
Ann. Assoc. Amer. Geographers
, vol.94
, Issue.3
, pp. 491-502
-
-
Church, R.L.1
Scaparra, M.P.2
Middleton, R.S.3
-
10
-
-
79960861815
-
Lessons learned from CORONET
-
Mar.
-
G. Clapp, R. Doverspike, R. Skoog, J. Strand, and A. V. Lehmen, "Lessons learned from CORONET,"in OSA OFC, Mar. 2010.
-
(2010)
OSA OFC
-
-
Clapp, G.1
Doverspike, R.2
Skoog, R.3
Strand, J.4
Lehmen, A.V.5
-
14
-
-
82855161719
-
-
Apr.
-
J. S. Foster, E. Gjelde, W. R. Graham, R. J. Hermann, H. M. Kluepfel, R. L. Lawson, G. K. Soper, L. L. Wood, and J. B. Woodard, "Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack, critical national infrastructures,"Apr. 2008.
-
(2008)
Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, Critical National Infrastructures
-
-
Foster, J.S.1
Gjelde, E.2
Graham, W.R.3
Hermann, R.J.4
Kluepfel, H.M.5
Lawson, R.L.6
Soper, G.K.7
Wood, L.L.8
Woodard, J.B.9
-
15
-
-
27144491076
-
Stability and topology of scale-free networks under attack and defense strategies
-
L. K. Gallos, R. Cohen, P. Argyrakis, A. Bunde, and S. Havlin, "Stability and topology of scale-free networks under attack and defense strategies,"Phys. Rev. Lett., vol. 94, no. 18, 2005.
-
(2005)
Phys. Rev. Lett.
, vol.94
, Issue.18
-
-
Gallos, L.K.1
Cohen, R.2
Argyrakis, P.3
Bunde, A.4
Havlin, S.5
-
17
-
-
79951651475
-
Dynamic load balancing for robust distributed computing in the presence of topological impairments
-
M. M. Hayat, J. E. Pezoa, D. Dietz, and S. Dhakal, "Dynamic load balancing for robust distributed computing in the presence of topological impairments,"Wiley Handbook of Science and Technology for Homeland Security, 2009.
-
(2009)
Wiley Handbook of Science and Technology for Homeland Security
-
-
Hayat, M.M.1
Pezoa, J.E.2
Dietz, D.3
Dhakal, S.4
-
18
-
-
0032164214
-
Analysis of the greedy approach in problems of maximum k-coverage
-
D. Hochbaum and A. Pathria, "Analysis of the greedy approach in problems of maximum k-coverage,"Naval Research Logistics (NRL), vol. 45, no. 6, pp. 615-627, 1998.
-
(1998)
Naval Research Logistics (NRL)
, vol.45
, Issue.6
, pp. 615-627
-
-
Hochbaum, D.1
Pathria, A.2
-
19
-
-
2942565524
-
-
IETF Internet Working Group, November Inference of Shared Risk Link Groups. [Online]. Available
-
IETF Internet Working Group, "Inference of Shared Risk Link Groups,"November 2001, Internet Draft. [Online]. Available: http://tools.ietf.org/html/draft-many-inference-srlg-02
-
(2001)
Internet Draft
-
-
-
20
-
-
84875952664
-
-
[Online]. Available
-
Level 3 Communications, Network Map. [Online]. Available: http://www.level3.com/interacts/map.html
-
Network Map
-
-
-
21
-
-
61449238132
-
Scalability of network-failure resilience: Analysis using multi-layer probabilistic graphical models
-
Feb.
-
G. Liu and C. Ji, "Scalability of network-failure resilience: Analysis using multi-layer probabilistic graphical models,"IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 319 -331, Feb. 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 319-331
-
-
Liu, G.1
Ji, C.2
-
22
-
-
6944229536
-
Physical topology design for survivable routing of logical rings in WDM-based networks
-
Oct.
-
A. Narula-Tam, E. Modiano, and A. Brzezinski, "Physical topology design for survivable routing of logical rings in WDM-based networks,"IEEE J. Sel. Areas Commun., vol. 22, no. 8, pp. 1525-1538, Oct. 2004.
-
(2004)
IEEE J. Sel. Areas Commun.
, vol.22
, Issue.8
, pp. 1525-1538
-
-
Narula-Tam, A.1
Modiano, E.2
Brzezinski, A.3
-
23
-
-
0000095809
-
An analysis of approximations for maximizing submodular set functions - I
-
December
-
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, "An analysis of approximations for maximizing submodular set functions - i,"Math. Prog., vol. 14, no. 1, pp. 265-294, December 1978.
-
(1978)
Math. Prog.
, vol.14
, Issue.1
, pp. 265-294
-
-
Nemhauser, G.L.1
Wolsey, L.A.2
Fisher, M.L.3
-
24
-
-
77953317622
-
Network reliability with geographically correlated failures
-
Mar.
-
S. Neumayer and E. Modiano, "Network reliability with geographically correlated failures,"in Proc. IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Neumayer, S.1
Modiano, E.2
-
25
-
-
70349686850
-
Assessing the vulnerability of the fiber infrastructure to disasters
-
Apr.
-
S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the vulnerability of the fiber infrastructure to disasters,"in Proc. IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Neumayer, S.1
Zussman, G.2
Cohen, R.3
Modiano, E.4
-
28
-
-
0027188162
-
The network inhibition problem
-
C. A. Phillips, "The network inhibition problem,"in Proc. ACM STOC, 1993.
-
(1993)
Proc. ACM STOC
-
-
Phillips, C.A.1
-
30
-
-
79960855860
-
-
[Online] Available
-
Qwest, Network Map. [Online]. Available: http://www.qwest.com/ largebusiness/enterprisesolutions/networkMaps/
-
Qwest Network Map
-
-
-
31
-
-
74949099389
-
Region-based connectivity: A new paradigm for design of fault-tolerant networks
-
A. Sen, S. Murthy, and S. Banerjee, "Region-based connectivity: a new paradigm for design of fault-tolerant networks,"in Proc. IEEE HPSR, 2009.
-
(2009)
Proc. IEEE HPSR
-
-
Sen, A.1
Murthy, S.2
Banerjee, S.3
-
32
-
-
39049126617
-
Fault-tolerance in sensor networks: A new evaluation metric
-
A. Sen, B. Shen, L. Zhou, and B. Hao, "Fault-tolerance in sensor networks: a new evaluation metric,"in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Sen, A.1
Shen, B.2
Zhou, L.3
Hao, B.4
-
34
-
-
84898318004
-
Dependent failures in data communication systems
-
Dec.
-
J. Spragins, "Dependent failures in data communication systems,"IEEE Trans. Commun., vol. 25, no. 12, pp. 1494 - 1499, Dec. 1977.
-
(1977)
IEEE Trans. Commun.
, vol.25
, Issue.12
, pp. 1494-1499
-
-
Spragins, J.1
-
35
-
-
77951698315
-
Geometric optimzation and sums of algebraic functions
-
A. Vigneron, "Geometric optimzation and sums of algebraic functions,"in Proc. ACM-SIAM SODA, 2010.
-
(2010)
Proc. ACM-SIAM SODA
-
-
Vigneron, A.1
-
36
-
-
63549104205
-
High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments
-
July. [Online]. Available
-
C. Wilson, "High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments,"CRS Report for Congress, July 2008. [Online]. Available: http://www.ntia.doc.gov/broadbandgrants/ comments/7926.pdf
-
(2008)
CRS Report for Congress
-
-
Wilson, C.1
-
37
-
-
70350131484
-
Topology design of undersea cables considering survivability under major disasters
-
May
-
W. Wu, B. Moran, J. Manton, and M. Zukerman, "Topology design of undersea cables considering survivability under major disasters,"in Proc. WAINA, May 2009.
-
(2009)
Proc. WAINA
-
-
Wu, W.1
Moran, B.2
Manton, J.3
Zukerman, M.4
-
38
-
-
79960884184
-
-
[Online] Available
-
XO Communications, Network Map. [Online]. Available: http://www.xo.com/ about/network/Pages/maps.aspx
-
XO Communications and Network Map
-
-
|