-
1
-
-
0032482432
-
Collective dynamics of 'small-world'networks
-
D. J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world'networks," Nature, vol. 393, pp. 440-442, 1998.
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
2
-
-
0038483826
-
Emergence of scaling in randomnetworks
-
A.-L. Barabási and R. Albert, "Emergence of scaling in randomnetworks," Science, vol. 286, no. 5439, pp. 509-512, 1999.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
3
-
-
0035826155
-
Exploring complex networks
-
DOI 10.1038/35065725
-
S. H. Strogatz, "Exploring complex networks," Nature, vol. 410, pp.268-276, Mar. 2001. (Pubitemid 32216604)
-
(2001)
Nature
, vol.410
, Issue.6825
, pp. 268-276
-
-
Strogatz, S.H.1
-
4
-
-
0036013593
-
Statistical mechanics of complexnetworks
-
Jan
-
R. Albert and A.-L. Barabási, "Statistical mechanics of complexnetworks," Reviews of Modern Physics, vol. 74, pp. 47-97, Jan. 2002.
-
(2002)
Reviews of Modern Physics
, vol.74
, pp. 47-97
-
-
Albert, R.1
Barabási, A.-L.2
-
5
-
-
0038718854
-
The structure and function of complex networks
-
M. E. J. Newman, "The structure and function of complex networks,"SIAM Review, vol. 45, no. 2, pp. 167-256, 2003.
-
(2003)
SIAM, Review
, vol.45
, Issue.2
, pp. 167-256
-
-
Newman, M.E.J.1
-
6
-
-
31344474880
-
Complex networks: Structure and dynamics
-
DOI 10.1016/j.physrep.2005.10.009, PII S037015730500462X
-
S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang,"Complex networks: Structure and dynamics," Physics Reports, vol.424, no. 4-5, pp. 175-308, 2006. (Pubitemid 43135890)
-
(2006)
Physics Reports
, vol.424
, Issue.4-5
, pp. 175-308
-
-
Boccaletti, S.1
Latora, V.2
Moreno, Y.3
Chavez, M.4
Hwang, D.-U.5
-
7
-
-
67749140118
-
Scale-free networks: A decade and beyond
-
A.-L. Barabási, "Scale-free networks: A decade and beyond," Science,vol. 325, no. 5939, pp. 412-413, 2009.
-
(2009)
Science
, vol.325
, Issue.5939
, pp. 412-413
-
-
Barabási, A.-L.1
-
9
-
-
33750139941
-
A framework for Web Science
-
DOI 10.1561/1800000001
-
T. Berners-Lee, W. Hall, J. A. Hendler, K. O'Hara, N. Shadbolt, andD. J. Weitzner, "A framework for web science," Found. Trends WebSci., vol. 1, pp. 1-130, Jan. 2006. (Pubitemid 44590982)
-
(2006)
Foundations and Trends in Web Science
, vol.1
, Issue.1
, pp. 1-130
-
-
Berners-Lee, T.1
Hall, W.2
Hendler, J.A.3
O'Hara, K.4
Shadbolt, N.5
Weitzner, D.J.6
-
10
-
-
0033890493
-
Topology discovery in heterogeneous IP networks
-
Y. Breitbart, M. Garofalakis, C. Martin, R. Rastogi, S. Seshadri, andA. Silberschatz, "Topology discovery in heterogeneous IP networks,"in Proc. IEEE INFOCOM 2000. Nineteenth Annual Joint Conferenceof the IEEE Computer and Communications Societies, vol. 1, 2000,pp. 265-274 vol 1 (Pubitemid 30584585)
-
(2000)
Proceedings - IEEE INFOCOM
, vol.1
, pp. 265-274
-
-
Breitbart Yuri1
Garofalakis Minos2
Martin Cliff3
Rastogi Rajeev4
Seshadri, S.5
Silberschatz Avi6
-
11
-
-
4344610617
-
Topology discovery in heterogeneous IP networks:The netinventory system
-
Jun
-
Y. Breitbart, M. Garofalakis, B. Jai, C. Martin, R. Rastogi, andA. Silberschatz, "Topology discovery in heterogeneous IP networks:The netinventory system," IEEE/ACM Trans. Netw., vol. 12, no. 3, pp.401-414, Jun. 2004.
-
(2004)
IEEE/ACM Trans. Netw
, vol.12
, Issue.3
, pp. 401-414
-
-
Breitbart, Y.1
Garofalakis, M.2
Jai, B.3
Martin, C.4
Rastogi, R.5
Silberschatz, A.6
-
12
-
-
57049122748
-
Internet topology discovery: A survey
-
quarter
-
B. Donnet and T. Friedman, "Internet topology discovery: A survey,"IEEE Commun. Surveys Tuts., vol. 9, no. 4, pp. 56-69, quarter 2007.
-
(2007)
IEEE Commun. Surveys Tuts
, vol.9
, Issue.4
, pp. 56-69
-
-
Donnet, B.1
Friedman, T.2
-
13
-
-
84892619905
-
Networktopologies: Inference, modeling, and generation
-
H. Haddadi, M. Rio, G. Iannaccone, A. Moore, and R. Mortier, "Networktopologies: inference, modeling, and generation," IEEE Commun.Surveys Tuts., vol. 10, no. 2, pp. 48-69, 2008.
-
(2008)
IEEE Commun.Surveys Tuts
, vol.10
, Issue.2
, pp. 48-69
-
-
Haddadi, H.1
Rio, M.2
Iannaccone, G.3
Moore, A.4
Mortier, R.5
-
14
-
-
55149112127
-
The convergence of social and technological networks
-
Nov
-
J. Kleinberg, "The convergence of social and technological networks,"Commun. ACM, vol. 51, pp. 66-72, Nov. 2008.
-
(2008)
Commun ACM
, vol.51
, pp. 66-72
-
-
Kleinberg, J.1
-
15
-
-
0000679014
-
A formal theory of interaction in social groups
-
H. A. Simon, "A formal theory of interaction in social groups,"American Sociological Review, vol. 17, no. 2, pp. pp. 202-211, 1952.
-
(1952)
American Sociological Review
, vol.17
, Issue.2
, pp. 202-211
-
-
Simon, H.A.1
-
16
-
-
51249193741
-
Contribution to the theory of random and biased nets
-
A. Rapoport, "Contribution to the theory of random and biased nets,"The Bulletin of Mathematical Biophysics, vol. 19, pp. 257-277, 1957.
-
(1957)
The Bulletin of Mathematical Biophysics
, vol.19
, pp. 257-277
-
-
Rapoport, A.1
-
17
-
-
0002687371
-
The small world problem
-
May
-
S. Milgram, "The small world problem," Psychology Today, vol. 1, pp.61-67, May 1967.
-
(1967)
Psychology Today
, vol.1
, pp. 61-67
-
-
Milgram, S.1
-
18
-
-
60149086627
-
Networkanalysis in the social sciences
-
S. P. Borgatti, A. Mehra, D. J. Brass, and G. Labianca, "Networkanalysis in the social sciences," Science, vol. 323, no. 5916, pp. 892-895, 2009.
-
(2009)
Science
, vol.323
, Issue.5916
, pp. 892-895
-
-
Borgatti, S.P.1
Mehra, A.2
Brass, D.J.3
Labianca, G.4
-
19
-
-
85032751937
-
Dynamic graphical models
-
Nov
-
J. Bilmes, "Dynamic graphical models," IEEE Signal Process. Mag.,vol. 27, no. 6, pp. 29-42, Nov. 2010.
-
(2010)
IEEE Signal Process. Mag
, vol.27
, Issue.6
, pp. 29-42
-
-
Bilmes, J.1
-
20
-
-
85032752145
-
Graphical models for time-series
-
Nov
-
D. Barber and A. Cemgil, "Graphical models for time-series," IEEESignal Process. Mag., vol. 27, no. 6, pp. 18-28, Nov. 2010.
-
(2010)
IEEESignal Process. Mag
, vol.27
, Issue.6
, pp. 18-28
-
-
Barber, D.1
Cemgil, A.2
-
24
-
-
11944253901
-
-
W. Fulton, A. Katok, F. Kirwan,P. Sarnak, B. Simon, and B. Totaro, Eds. Cambridge, University Press
-
B. Bollobas, Random Graphs, W. Fulton, A. Katok, F. Kirwan,P. Sarnak, B. Simon, and B. Totaro, Eds. Cambridge University Press,2001.
-
(2001)
Random Graphs
-
-
Bollobas, B.1
-
25
-
-
0001540595
-
Onrandom graphs, i
-
P. Erdös and A. Rényi, "On random graphs, I," Publicationes Mathematicae(Debrecen), vol. 6, pp. 290-297, 1959.
-
(1959)
Publicationes Mathematicae(Debrecen)
, vol.6
, pp. 290-297
-
-
Erdös, P.1
Rényi, A.2
-
26
-
-
0001173999
-
Construction of Bayesian network structures from data: A brief survey and an efficient algorithm
-
M. Singh and M. Valtorta, "Construction of Bayesian network structures from data: A brief survey and an efficient algorithm," InternationalJournal of Approximate Reasoning, vol. 12, no. 2, pp. 111-131, 1995.
-
(1995)
InternationalJournal of Approximate Reasoning
, vol.12
, Issue.2
, pp. 111-131
-
-
Singh, M.1
Valtorta, M.2
-
28
-
-
0002282678
-
Probability, frequency and reasonable expectation
-
Jan
-
R. T. Cox, "Probability, frequency and reasonable expectation," AmericanJournal of Physics, vol. 14, no. 1, pp. 1-13, Jan. 1946.
-
(1946)
American Journal of Physics
, vol.14
, Issue.1
, pp. 1-13
-
-
Cox, R.T.1
-
29
-
-
0037062448
-
Community structure in social and biological networks
-
DOI 10.1073/pnas.122653799
-
M. Girvan and M. E. J. Newman, "Community structure in social andbiological networks," Proc. National Academy of Sciences, vol. 99,no. 12, pp. 7821-7826, Jun. 2002. (Pubitemid 34650963)
-
(2002)
Proceedings of the National Academy of Sciences of the United States of America
, vol.99
, Issue.12
, pp. 7821-7826
-
-
Girvan, M.1
Newman, M.E.J.2
-
30
-
-
0242663598
-
Why social networks are different fromother types of networks
-
Sep
-
M. E. J. Newman and J. Park, "Why social networks are different fromother types of networks," Phys. Rev. E, vol. 68, p. 036122, Sep. 2003.
-
(2003)
Phys. Rev. e
, vol.68
, pp. 036122
-
-
Newman, M.E.J.1
Park, J.2
-
31
-
-
1942488295
-
The rich-club phenomenon in the internettopology
-
Mar
-
S. Zhou and R. Mondragon, "The rich-club phenomenon in the internettopology," IEEE Commun. Lett., vol. 8, no. 3, pp. 180-182, Mar. 2004.
-
(2004)
IEEE Commun. Lett
, vol.8
, Issue.3
, pp. 180-182
-
-
Zhou, S.1
Mondragon, R.2
-
32
-
-
77952375075
-
Information-theoretic coclustering
-
I. S. Dhillon, S. Mallela, and D. S. Modha, "Information-theoretic coclustering,"in Proc. ninth ACM SIGKDD International Conference onKnowledge Discovery and Data Mining, 2003, pp. 89-98.
-
(2003)
Proc. Ninth ACM SIGKDD International Conference OnKnowledge Discovery and Data Mining
, pp. 89-98
-
-
Dhillon, I.S.1
Mallela, S.2
Modha, D.S.3
-
33
-
-
33745012299
-
Modularity and community structure in networks
-
DOI 10.1073/pnas.0601602103
-
M. E. J. Newman, "Modularity and community structure in networks,"Proc. National Academy of Sciences, vol. 103, no. 23, pp. 8577-8582,Jun. 2006. (Pubitemid 43878062)
-
(2006)
Proceedings of the National Academy of Sciences of the United States of America
, vol.103
, Issue.23
, pp. 8577-8582
-
-
Newman, M.E.J.1
-
34
-
-
20444504323
-
Uncovering the overlapping community structure of complex networks in nature and society
-
DOI 10.1038/nature03607
-
G. Palla, I. Derenyi, I. Farkas, and T. Vicsek, "Uncovering theoverlapping community structure of complex networks in nature and society," Nature, vol. 435, pp. 814-818, Jun. 2005. (Pubitemid 40839731)
-
(2005)
Nature
, vol.435
, Issue.7043
, pp. 814-818
-
-
Palla, G.1
Derenyi, I.2
Farkas, I.3
Vicsek, T.4
-
35
-
-
34250628484
-
Structure and tie strengths in mobilecommunication networks
-
May
-
J. P. Onnela, J. Saramäki, J. Hyvönen, G. Szabó, D. Lazer, K. Kaski,J. Kertész, and A. L. Barabási, "Structure and tie strengths in mobilecommunication networks," Proc. National Academy of Sciences, vol.104, no. 18, pp. 7332-7336, May 2007.
-
(2007)
Proc. National Academy of Sciences
, vol.104
, Issue.18
, pp. 7332-7336
-
-
Onnela, J.P.1
Saramäki, J.2
Hyvönen, J.3
Szabó, G.4
Lazer, D.5
Kaski, K.6
Kertész, J.7
Barabási, A.L.8
-
36
-
-
34248205060
-
Graph evolution: Densificationand shrinking diameters
-
article, 2, Mar
-
J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graph evolution: Densificationand shrinking diameters," ACM Trans. Knowl. Discov. Data,vol. 1, no. 1, article 2, Mar. 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
-
-
Leskovec, J.1
Kleinberg, J.2
Faloutsos, C.3
-
37
-
-
73649133526
-
Introduction tostochastic actor-based models for network dynamics
-
T. A. Snijders, G. G. van de Bunt, and C. E. Steglich, "Introduction tostochastic actor-based models for network dynamics," Social Networks,vol. 32, no. 1, pp. 44-60, 2010.
-
(2010)
Social Networks
, vol.32
, Issue.1
, pp. 44-60
-
-
Snijders, T.A.1
Bunt De Van, G.G.2
Steglich, C.E.3
-
38
-
-
77954603933
-
Modeling relationship strengthin online social networks
-
R. Xiang, J. Neville, and M. Rogati, "Modeling relationship strengthin online social networks," in Proc. 19th International Conference onWorld Wide Web, 2010, pp. 981-990.
-
(2010)
Proc. 19th International Conference OnWorld Wide Web
, pp. 981-990
-
-
Xiang, R.1
Neville, J.2
Rogati, M.3
-
40
-
-
44649091279
-
Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks
-
DOI 10.1109/JSAC.2008.080602, 4530732
-
P. Costa, C. Mascolo, M. Musolesi, and G. Picco, "Socially-aware routingfor publish-subscribe in delay-tolerant mobile ad hoc networks,"IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 748-760, Jun. 2008. (Pubitemid 351780193)
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.5
, pp. 748-760
-
-
Costa, P.1
Mascolo, C.2
Musolesi, M.3
Picco, G.P.4
-
42
-
-
77954942474
-
Socially-inspired topologyimprovements in wireless multi-hop networks
-
May
-
E. Stai, V. Karyotis, and S. Papavassiliou, "Socially-inspired topologyimprovements in wireless multi-hop networks," in 2010 IEEE InternationalConference on Communications Workshops (ICC), May 2010,pp. 1-6.
-
(2010)
2010 IEEE InternationalConference on Communications Workshops (ICC)
, pp. 1-6
-
-
Stai, E.1
Karyotis, V.2
Papavassiliou, S.3
-
43
-
-
77954605356
-
Throughput scaling of wireless networks with random connections
-
Aug
-
S. Cui, A. M. Haimovich, O. Somekh, H. V. Poor, and S. Shamai,"Throughput scaling of wireless networks with random connections,"IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3793-3806, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3793-3806
-
-
Cui, S.1
Haimovich, A.M.2
Somekh, O.3
Poor, H.V.4
Shamai, S.5
-
44
-
-
0033204106
-
On power-law relationshipsof the internet topology
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationshipsof the internet topology," in Proc. Conference on Applications,Technologies, Architectures, and Protocols for Computer Communication,1999, pp. 251-262.
-
(1999)
Proc. Conference on Applications,Technologies, Architectures, and Protocols for Computer Communication
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
45
-
-
80053632729
-
10 lessons from 10 years of measuring and modeling the internet'sautonomous systems
-
Oct.
-
M. Roughan, W. Willinger, O. Maennel, D. Perouli, and R. Bush,"10 lessons from 10 years of measuring and modeling the internet'sautonomous systems," IEEE J. Sel. Areas Commun., vol. 29, no. 9, pp.1810-1821, Oct. 2011.
-
(2011)
IEEE J. Sel. Areas Commun
, vol.29
, Issue.9
, pp. 1810-1821
-
-
Roughan, M.1
Willinger, W.2
Maennel, O.3
Perouli, D.4
Bush, R.5
-
46
-
-
34848922130
-
On the bias of traceroute sampling or, power-law degree distributions in regular graphs
-
DOI 10.1145/1060590.1060693, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
D. Achlioptas, A. Clauset, D. Kempe, and C. Moore, "On the biasof traceroute sampling: Or, power-law degree distributions in regulargraphs," in Proc. Thirty-seventh Annual ACM Symposium on Theoryof Computing, 2005, pp. 694-703. (Pubitemid 43098642)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 694-703
-
-
Achlioptas, D.1
Kempe, D.2
Clauset, A.3
Moore, C.4
-
47
-
-
79960601554
-
A brief history of generative models for power lawand lognormal distributions
-
M. Mitzenmacher, "A brief history of generative models for power lawand lognormal distributions," Internet Mathematics, vol. 1, pp. 226-249, 2003.
-
(2003)
Internet Mathematics
, vol.1
, pp. 226-249
-
-
Mitzenmacher, M.1
-
48
-
-
0034721164
-
Error and attack tolerance of complex networks
-
DOI 10.1038/35019019
-
R. Albert, H. Jeong, and A.-L. Barabási, "Error and attack toleranceof complex networks," Nature, vol. 406, pp. 378-382, Jul. 2000. (Pubitemid 30625551)
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
49
-
-
29844458140
-
Understanding internet topology: Principles, models, and validation
-
DOI 10.1109/TNET.2005.861250
-
D. Alderson, L. Li, W. Willinger, and J. Doyle, "Understanding internettopology: principles, models, and validation," IEEE/ACM Trans. Netw.,vol. 13, no. 6, pp. 1205-1218, Dec. 2005. (Pubitemid 43034130)
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.6
, pp. 1205-1218
-
-
Alderson, D.1
Li, L.2
Willinger, W.3
Doyle, J.C.4
-
50
-
-
77956953218
-
Measuring user behavior in online socialnet works
-
Sep
-
L. Gyarmati and T. A. Trinh, "Measuring user behavior in online socialnet works," IEEE Netw., vol. 24, no. 5, pp. 26-31, Sep. 2010.
-
(2010)
IEEE Netw
, vol.24
, Issue.5
, pp. 26-31
-
-
Gyarmati, L.1
Trinh, T.A.2
-
51
-
-
79959972450
-
Security issues inonline social networks
-
Jul
-
H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen, "Security issues inonline social networks," IEEE Internet Comput., vol. 15, no. 4, pp.56-63, Jul. 2011.
-
(2011)
IEEE Internet Comput
, vol.15
, Issue.4
, pp. 56-63
-
-
Gao, H.1
Hu, J.2
Huang, T.3
Wang, J.4
Chen, Y.5
-
52
-
-
0001669805
-
New methods for reasoning towards posterior distributionsbased on sample data
-
Apr
-
A. P. Dempster, "New methods for reasoning towards posterior distributionsbased on sample data," The Annals of Mathematical Statistics,vol. 37, no. 2, pp. 355-374, Apr. 1966.
-
(1966)
The Annals of Mathematical Statistics
, vol.37
, Issue.2
, pp. 355-374
-
-
Dempster, A.P.1
-
53
-
-
0001598089
-
Belief functions and parametric models
-
G. Shafer, "Belief functions and parametric models," J. Royal StatisticalSociety. Series B (Methodological), vol. 44, no. 3, pp. 322-352,1982.
-
(1982)
J. Royal StatisticalSociety. Series B (Methodological)
, vol.44
, Issue.3
, pp. 322-352
-
-
Shafer, G.1
-
54
-
-
34547637688
-
Trust among strangers in Internettransactions: Empirical analysis of eBay's reputation system. theeconomics of the Internet and e-commerce
-
Elsevier Science
-
P. Resnick and R. Zeckhauser, "Trust among strangers in Internettransactions: Empirical analysis of eBay's reputation system. theeconomics of the Internet and e-commerce," in Advances in AppliedMicroeconomics, M. R. Baye, Ed. Amsterdam, Elsevier Science, 2002,vol. 11, pp. 127-157.
-
(2002)
Advances in AppliedMicroeconomics, M. R. Baye, Ed. Amsterdam
, vol.11
, pp. 127-157
-
-
Resnick, P.1
Zeckhauser, R.2
-
55
-
-
84943784070
-
Trust and reputation model in peer-to-peernetworks
-
Sep
-
Y. Wang and J. Vassileva, "Trust and reputation model in peer-to-peernetworks," in Proc. P2P '03, Sep. 2003, pp. 150-157.
-
(2003)
Proc. P2P '
, vol.3
, pp. 150-157
-
-
Wang, Y.1
Vassileva, J.2
-
56
-
-
2442597363
-
Performance analysis of the CONFIDANT protocol
-
Jun
-
S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the CONFIDANT protocol," in Proc. ACM MobiHoc '02, Jun. 2002, pp.226-236.
-
(2002)
Proc ACM MobiHoc '02
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
57
-
-
33144465932
-
Information theoreticframework of trust modeling and evaluation for ad hoc networks
-
Feb
-
Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoreticframework of trust modeling and evaluation for ad hoc networks," IEEEJ. Sel. Areas Commun., vol. 24, no. 2, pp. 305-317, Feb. 2006.
-
(2006)
IEEEJ. Sel. Areas Commun
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
58
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
DOI 10.1109/JSAC.2005.861390
-
G. Theodorakopoulos and J. S. Baras, "On trust models and trustevaluation metrics for ad hoc networks," IEEE J. Sel. Areas Commun.,vol. 24, no. 2, pp. 318-328, Feb. 2006. (Pubitemid 43269752)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
59
-
-
33846834126
-
A survey of trust and reputationsystems for online service provision
-
Mar
-
A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputationsystems for online service provision," Decision Support Systems,vol. 43, no. 2, p. 618V644, Mar. 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
60
-
-
80053638242
-
Practicalrecommendations on crawling online social networks
-
Oct
-
M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou, "Practicalrecommendations on crawling online social networks," IEEE J. Sel.Areas Commun., vol. 29, no. 9, pp. 1872-1892, Oct. 2011.
-
(2011)
IEEE J. Sel.Areas Commun
, vol.29
, Issue.9
, pp. 1872-1892
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.T.3
Markopoulou, A.4
-
61
-
-
80053654964
-
Multigraphsampling of online social networks
-
Oct
-
M. Gjoka, C. T. Butts, M. Kurant, and A. Markopoulou, "Multigraphsampling of online social networks," IEEE J. Sel. Areas Commun.,vol. 29, no. 9, pp. 1893-1905, Oct. 2011.
-
(2011)
IEEE J. Sel. Areas Commun
, vol.29
, Issue.9
, pp. 1893-1905
-
-
Gjoka, M.1
Butts, C.T.2
Kurant, M.3
Markopoulou, A.4
-
62
-
-
77953576532
-
Using probabilistic confidence models fortrust inference in web-based social networks
-
Oct
-
U. Kuter and J. Golbeck, "Using probabilistic confidence models fortrust inference in web-based social networks," ACM Trans. InternetTechnology, vol. 3, no. 1, Oct. 2010.
-
(2010)
ACM Trans. InternetTechnology
, vol.3
, Issue.1
-
-
Kuter, U.1
Golbeck, J.2
-
63
-
-
80155177622
-
Who is doing what and when: Social map-based recommendation forcontent-centric social web sites
-
Oct
-
S. Zhao, M. X. Zhou, X. Zhang, Q. Yuan, W. Zheng, and R. Fu,"Who is doing what and when: Social map-based recommendation forcontent-centric social web sites," ACM Trans. Intelligent Systems andTechnology, vol. 3, no. 1, Oct. 2011.
-
(2011)
ACM Trans. Intelligent Systems AndTechnology
, vol.3
, Issue.1
-
-
Zhao, S.1
Zhou, M.X.2
Zhang, X.3
Yuan, Q.4
Zheng, W.5
Fu, R.6
-
64
-
-
79955688653
-
Learning to recommend with explicitand implicit social relations
-
Apr
-
H. Ma, I. King, and M. R. Lyu, "Learning to recommend with explicitand implicit social relations," ACM Trans. Intelligent Systems andTechnology, vol. 2, no. 3, Apr. 2011.
-
(2011)
ACM Trans. Intelligent Systems AndTechnology
, vol.2
, Issue.3
-
-
Ma, H.1
King, I.2
Lyu, M.R.3
-
65
-
-
84870027515
-
-
Master's thesis, Systems Engineering, Policy Analysis and Management,Delft University of Technology, Delft, The Netherlands
-
D. Riphagen, "Privacy Risks for Users of Social Network Sites," Master'sthesis, Systems Engineering, Policy Analysis and Management,Delft University of Technology, Delft, The Netherlands, 2008.
-
(2008)
Privacy Risks for Users of Social Network Sites
-
-
Riphagen, D.1
-
66
-
-
78650743404
-
A framework for computing the privacy scoresof users in online social networks
-
Dec
-
K. Liu and E. Terzi, "A framework for computing the privacy scoresof users in online social networks," ACM Trans. Knowledge Discoveryfrom Data, vol. 5, pp. 6:1-6:30, Dec. 2010.
-
(2010)
ACM Trans. Knowledge Discoveryfrom Data
, vol.5
, pp. 61-630
-
-
Liu, K.1
Terzi, E.2
-
68
-
-
77955465513
-
Measuring privacy risk in online socialnet works
-
Oakland, CA, May
-
J. Becker and H. Chen, "Measuring privacy risk in online socialnet works," in Proc. Web 2.0 Security & Privacy, Oakland, CA, May 2009.
-
(2009)
Proc. Web 2.0 Security & Privacy
-
-
Becker, J.1
Chen, H.2
-
69
-
-
80052705614
-
Socialcircles: Tackling privacy in social networks
-
Pittsburgh, PA, Jul
-
F. Adu-Oppong, C. K. Gardiner, A. Kapadia, and P. P. Tsang, "Socialcircles: Tackling privacy in social networks," in Proc. Symposium onUsable Privacy and Security, Pittsburgh, PA, Jul. 2008.
-
(2008)
Proc. Symposium OnUsable Privacy and Security
-
-
Adu-Oppong, F.1
Gardiner, C.K.2
Kapadia, A.3
Tsang, P.P.4
-
70
-
-
70849109966
-
Solutions to security and privacyissues in mobile social networking
-
Aug
-
A. Beach, M. Gartrell, and R. Han, "Solutions to security and privacyissues in mobile social networking," in Proc. International Conferenceon Computational Science and Engineering, 2009. CSE '09, vol. 4,Aug. 2009, pp. 1036-1042.
-
(2009)
Proc. International Conferenceon Computational Science and Engineering 2009. CSE '09
, vol.4
, pp. 1036-1042
-
-
Beach, A.1
Gartrell, M.2
Han, R.3
-
71
-
-
79952434371
-
An information-theoreticapproach to privacy
-
L. Sankar, S. R. Rajagopalan, and H. V. Poor, "An information-theoreticapproach to privacy," in Proc. 48th Annual Allerton Conference onCommunication, Control, and Computing, Oct. 2010, pp. 1220-1227.
-
(2010)
Proc. 48th Annual Allerton Conference OnCommunication, Control, and Computing, Oct
, pp. 1220-1227
-
-
Sankar, L.1
Rajagopalan, S.R.2
Poor, H.V.3
-
72
-
-
77955690373
-
A theory of utility andprivacy of data sources
-
Jun
-
L. Sankar, S. Rajagopalan, and H. V. Poor, "A theory of utility andprivacy of data sources," in Proc. 2010 IEEE International Symposiumon Information Theory, Jun. 2010, pp. 2642-2646.
-
(2010)
Proc. 2010 IEEE International Symposiumon Information Theory
, pp. 2642-2646
-
-
Sankar, L.1
Rajagopalan, S.2
Poor, H.V.3
-
73
-
-
84857213051
-
Discriminatory lossy sourcecoding: Side information privacy
-
Dec
-
R. Tandon, L. Sankar, and H. V. Poor, "Discriminatory lossy sourcecoding: Side information privacy," in Proc. 2011 IEEE Global CommunicationsConference, Dec. 2011, pp. 1-5.
-
(2011)
Proc. 2011 IEEE Global CommunicationsConference
, pp. 1-5
-
-
Tandon, R.1
Sankar, L.2
Poor, H.V.3
-
74
-
-
34848911641
-
Socialphishing
-
Oct
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Socialphishing," Communications of the ACM, vol. 40, no. 10, pp. 94-100,Oct. 2007.
-
(2007)
Communications of the ACM
, vol.40
, Issue.10
, pp. 94-10
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
75
-
-
34248995311
-
Modeling and simulation study ofthe propagation and defense of internet e-mail worms
-
Apr-Jun
-
C. Zou, D. Towsley, and W. Gong, "Modeling and simulation study ofthe propagation and defense of internet e-mail worms," IEEE Trans.Dependable Secure Comput., vol. 4, no. 2, pp. 105-118, Apr.-Jun.2007.
-
(2007)
IEEE Trans.Dependable Secure Comput
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
76
-
-
61449222889
-
Virus spread in networks
-
Feb
-
P. Van Mieghem, J. Omic, and R. Kooij, "Virus spread in networks,"IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 1-14, Feb. 2009.
-
(2009)
IEEE/ACM Trans. Netw
, vol.17
, Issue.1
, pp. 1-14
-
-
Van Mieghem, P.1
Omic, J.2
Kooij, R.3
-
77
-
-
84864868854
-
Smart attacks in smart gridcommunication networks
-
Aug
-
P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Smart attacks in smart gridcommunication networks," IEEE Commun. Mag., vol. 50, no. 8, pp.24-29, Aug. 2012.
-
(2012)
IEEE Commun. Mag
, vol.50
, Issue.8
, pp. 24-29
-
-
Chen, P.-Y.1
Cheng, S.-M.2
Chen, K.-C.3
-
78
-
-
84874432762
-
Multiparty access control for onlinesocial networks: Model and mechanisms
-
H. Hu, G. Ahn, and J. Jorgensen, "Multiparty access control for onlinesocial networks: Model and mechanisms," IEEE Trans. Knowl. DataEng., vol. PP, no. 99, p. 1, 2012.
-
(2012)
IEEE Trans. Knowl. DataEng.
, vol.PP
, Issue.99
, pp. 1
-
-
Hu, H.1
Ahn, G.2
Jorgensen, J.3
-
79
-
-
84883401788
-
Preventingprivate information inference attacks on social networks
-
R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, " Preventingprivate information inference attacks on social networks," IEEE Trans.Knowl. Data Eng., vol. PP, no. 99, p. 1, 2012.
-
(2012)
IEEE Trans.Knowl. Data Eng.
, vol.PP
, Issue.99
, pp. 1
-
-
Heatherly, R.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
80
-
-
84883345425
-
Protecting sensitive labels insocial network data anonymization
-
M. Yuan, L. Chen, P. Yu, and T. Yu, "Protecting sensitive labels insocial network data anonymization," IEEE Trans. Knowl. Data Eng.,vol. PP, no. 99, p. 1, 2012.
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.PP
, Issue.99
, pp. 1
-
-
Yuan, M.1
Chen, L.2
Yu, P.3
Yu, T.4
-
81
-
-
39449115370
-
Tolerance of intentional attacks in complex communication networks
-
DOI 10.1109/MCOM.2008.4427244
-
S. Xiao, G. Xiao, and T. H. Cheng, "Tolerance of intentional attacksin complex communication networks," IEEE Commun. Mag., vol. 46,no. 1, pp. 146-152, Jan. 2008. (Pubitemid 351266618)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.1
, pp. 146-152
-
-
Xiao, S.1
Xiao, G.2
Cheng, T.H.3
-
82
-
-
79959999053
-
Network resilience: A systematicapproach
-
Jul
-
P. Smith, D. Hutchison, J. Sterbenz, M. Schöandller, A. Fessi, M. Karaliopoulos,C. Lac, and B. Plattner, "Network resilience: a systematicapproach," IEEE Commun. Mag., vol. 49, no. 7, pp. 88-97, Jul. 2011.
-
(2011)
IEEE Commun. Mag
, vol.49
, Issue.7
, pp. 88-97
-
-
Smith, P.1
Hutchison, D.2
Sterbenz, J.3
Schöandller, M.4
Fessi, A.5
Karaliopoulosc. Lac, M.6
Plattner, B.7
-
84
-
-
0343441557
-
Navigation in a small world
-
DOI 10.1038/35022643
-
J. M. Kleinberg, "Navigation in a small world," Nature, vol. 406, p.845, 2000. (Pubitemid 30664249)
-
(2000)
Nature
, vol.406
, Issue.6798
, pp. 845
-
-
Kleinberg, J.M.1
-
85
-
-
0033196289
-
Networks, dynamics, and the small-world phenomenon
-
D. J. Watts, "Networks, dynamics, and the small-world phenomenon,"American Journal of Sociology, vol. 105, no. 2, pp. pp. 493-527, 1999.
-
(1999)
American Journal of Sociology
, vol.105
, Issue.2
, pp. 493-527
-
-
Watts, D.J.1
-
86
-
-
35348957264
-
Efficient behavior of small-world networks
-
Oct
-
V. Latora and M. Marchiori, "Efficient behavior of small-world networks,"Phys. Rev. Lett., vol. 87, p. 198701, Oct. 2001.
-
(2001)
Phys. Rev. Lett
, vol.87
, pp. 198701
-
-
Latora, V.1
Marchiori, M.2
-
87
-
-
65449153304
-
The structure of informationpathways in a social communication network
-
G. Kossinets, J. Kleinberg, and D. Watts, "The structure of informationpathways in a social communication network," in Proc. 14th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, 2008, pp. 435-443.
-
(2008)
Proc. 14th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 435-443
-
-
Kossinets, G.1
Kleinberg, J.2
Watts, D.3
-
88
-
-
0037123661
-
Identity and searchin social networks
-
D. J. Watts, P. S. Dodds, and M. E. J. Newman, "Identity and searchin social networks," Science, vol. 296, no. 5571, pp. 1302-1305, 2002.
-
(2002)
Science
, vol.296
, Issue.5571
, pp. 1302-1305
-
-
Watts, D.J.1
Dodds, P.S.2
Newman, M.E.J.3
-
89
-
-
0035860512
-
Computer networks as social networks
-
DOI 10.1126/science.1065547
-
B. Wellman, "Computer networks as social networks," Science, vol.293, no. 5537, pp. 2031-2034, 2001. (Pubitemid 32848041)
-
(2001)
Science
, vol.293
, Issue.5537
, pp. 2031-2034
-
-
Wellman, B.1
-
90
-
-
84976851626
-
Discovering shared interestsusing graph analysis
-
Aug
-
M. F. Schwartz and D. C. M. Wood, "Discovering shared interestsusing graph analysis," Commun. ACM, vol. 36, pp. 78-89, Aug. 1993.
-
(1993)
Commun ACM
, vol.36
, pp. 78-89
-
-
Schwartz, M.F.1
Wood, D.C.M.2
-
91
-
-
1842615145
-
Informationflow in social groups
-
F. Wu, B. A. Huberman, L. A. Adamic, and J. R. Tyler, "Informationflow in social groups," Physica A: Statistical Mechanics and itsApplications, vol. 337, no. 1-2, pp. 327-335, 2004.
-
(2004)
Physica A: Statistical Mechanics and ItsApplications
, vol.337
, Issue.1-2
, pp. 327-335
-
-
Wu, F.1
Huberman, B.A.2
Adamic, L.A.3
Tyler, J.R.4
-
92
-
-
20444434710
-
How to search a social network
-
DOI 10.1016/j.socnet.2005.01.007, PII S0378873305000109
-
L. Adamic and E. Adar, "How to search a social network," Socialnet works, vol. 27, no. 3, pp. 187-203, 2005. (Pubitemid 40829786)
-
(2005)
Social Networks
, vol.27
, Issue.3
, pp. 187-203
-
-
Adamic, L.1
Adar, E.2
-
93
-
-
85032751502
-
Theevolution of online social networks: A tutorial survey
-
Mar
-
C. Leberknight, H. Inaltekin, M. Chiang, and H. V. Poor, "Theevolution of online social networks: A tutorial survey," IEEE Signal Process. Mag., vol. 29, no. 2, pp. 41-52, Mar. 2012.
-
(2012)
IEEE Signal Process. Mag
, vol.29
, Issue.2
, pp. 41-52
-
-
Leberknight, C.1
Inaltekin, H.2
Chiang, M.3
Poor, H.V.4
-
94
-
-
0021825926
-
Shortest-path problem for graphs with random arc-lengths
-
DOI 10.1016/0166-218X(85)90059-9
-
A. Frieze and G. Grimmett, "The shortest-path problem for graphs withrandom arc-lengths," Discrete Applied Mathematics, vol. 10, no. 1, pp.57-77, 1985. (Pubitemid 15475455)
-
(1985)
Discrete Applied Mathematics
, vol.10
, Issue.1
, pp. 57-77
-
-
Frieze, A.M.1
Grimmett, G.R.2
-
95
-
-
0035794256
-
Epidemic spreading in scalefreenetworks
-
Apr
-
R. Pastor-Satorras and A. Vespignani, "Epidemic spreading in scalefreenetworks," Phys. Rev. Lett., vol. 86, pp. 3200-3203, Apr. 2001.
-
(2001)
Phys. Rev. Lett
, vol.86
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
96
-
-
84858201566
-
Delay of social search onsmall-world random geometric graphs
-
to appear in
-
H. Inaltekin, M. Chaing, and H. V. Poor, "Delay of social search onsmall-world random geometric graphs," to appear in J. Math. Sociol.
-
J. Math. Sociol
-
-
Inaltekin, H.1
Chaing, M.2
Poor, H.V.3
-
98
-
-
0021825926
-
Shortest-path problem for graphs with random arc-lengths
-
DOI 10.1016/0166-218X(85)90059-9
-
A. Frieze and G. Grimmett, "The shortest-path problem for graphs withrandom arc-lengths," Discrete Applied Mathematics, vol. 10, no. 1, pp.57-77, 1985. (Pubitemid 15475455)
-
(1985)
Discrete Applied Mathematics
, vol.10
, Issue.1
, pp. 57-77
-
-
Frieze, A.M.1
Grimmett, G.R.2
-
99
-
-
79961005336
-
Rumors in a network: Who's the culprit?
-
Aug
-
D. Shah and T. Zaman, "Rumors in a network: Who's the culprit?"IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5163-5181, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 5163-5181
-
-
Shah, D.1
Zaman, T.2
-
100
-
-
79551625887
-
Information epidemics in complex networkswith opportunistic links and dynamic topology
-
Dec
-
P.-Y. Chen and K.-C. Chen, "Information epidemics in complex networkswith opportunistic links and dynamic topology," in Proc. 2010IEEE Global Communications Conference, Dec. 2010, pp. 1-6.
-
(2010)
Proc. 2010IEEE Global Communications Conference
, pp. 1-6
-
-
Chen, P.-Y.1
Chen, K.-C.2
-
101
-
-
84883385213
-
Geo-communitybasedbroadcasting for data dissemination in mobile social networks
-
J. Fan, J. Chen, Y. Du, W. Gao, J. Wu, and Y. Sun, "Geo- communitybasedbroadcasting for data dissemination in mobile social networks,"IEEE Trans. Parallel Distrib. Syst., vol. PP, no. 99, p. 1, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.PP
, Issue.99
, pp. 1
-
-
Fan, J.1
Chen, J.2
Du, Y.3
Gao, W.4
Wu, J.5
Sun, Y.6
-
102
-
-
84861615162
-
Preference-aware contentdissemination in opportunistic mobile social networks
-
Mar
-
K. C.-J. Lin, C.-W. Chen, and C.-F. Chou, "Preference-aware contentdissemination in opportunistic mobile social networks," in Proc. IEEEINFOCOM 2012, Mar. 2012, pp. 1960-1968.
-
(2012)
Proc. IEEEINFOCOM 2012
, pp. 1960-1968
-
-
Lin, K.C.-J.1
Chen, C.-W.2
Chou, C.-F.3
-
103
-
-
25844517631
-
Gossip algorithms: Design, analysis and applications
-
Mar
-
S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Gossip algorithms:design, analysis and applications," in Proc. IEEE INFOCOM 2005,vol. 3, Mar. 2005, pp. 1653-1664.
-
(2005)
Proc IEEE INFOCOM 2005
, vol.3
, pp. 1653-1664
-
-
Boyd, S.1
Ghosh, A.2
Prabhakar, B.3
Shah, D.4
-
104
-
-
33745136409
-
Randomized gossip algorithms
-
Jun
-
, "Randomized gossip algorithms," IEEE Trans. Inf. Theory,vol. 52, no. 6, pp. 2508-2530, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.6
, pp. 2508-2530
-
-
-
105
-
-
64149119332
-
Consensus and cooperationin networked multi-agent systems
-
Jan
-
R. Olfati-Saber, J. Fax, and R. Murray, "Consensus and cooperationin networked multi-agent systems," Proc. IEEE, vol. 95, no. 1, pp.215-233, Jan. 2007.
-
(2007)
Proc IEEE
, vol.95
, Issue.1
, pp. 215-233
-
-
Olfati-Saber, R.1
Fax, J.2
Murray, R.3
-
106
-
-
84861610783
-
Proactive seeding for information cascades in cellular networks
-
Mar
-
M. F., M. Kurant, A. Markopoulou, C. Westphal, and U. C. Kozat,"Proactive seeding for information cascades in cellular networks," inProc. IEEE INFOCOM 2012, Mar. 2012, pp. 1719-1727.
-
(2012)
ProcIEEE INFOCOM 2012
, pp. 1719-1727
-
-
Kurant, M.1
Markopoulou, A.2
Westphal, C.3
Kozat, U.C.4
-
107
-
-
66349131932
-
Understandingthe spreading patterns of mobile phone viruses
-
P. Wang, M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understandingthe spreading patterns of mobile phone viruses," Science,vol. 324, no. 5930, pp. 1071-1076, 2009.
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1071-1076
-
-
Wang, P.1
Gonzalez, M.C.2
Hidalgo, C.A.3
Barabasi, A.-L.4
-
108
-
-
79551680433
-
On modelingmalware propagation in generalized social networks
-
Jan
-
S.-M. Cheng, W. C. Ao, P.-Y. Chen, and K.-C. Chen, "On modelingmalware propagation in generalized social networks," IEEE Commun.Lett., vol. 15, no. 1, pp. 25-27, Jan. 2011.
-
(2011)
IEEE Commun.Lett
, vol.15
, Issue.1
, pp. 25-27
-
-
Cheng, S.-M.1
Ao, W.C.2
Chen, P.-Y.3
Chen, K.-C.4
-
110
-
-
84883363700
-
Small-world phenomena and the dynamics of information
-
, "Small-world phenomena and the dynamics of information, "Science, vol. 14, no. 12, pp. 1-14, 2001.
-
(2001)
Science
, vol.14
, Issue.12
, pp. 1-14
-
-
-
111
-
-
79953784283
-
M2m:From mobile to embedded internet
-
Apr
-
G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, "M2m:From mobile to embedded internet," IEEE Commun. Mag., vol. 49,no. 4, pp. 36-43, Apr. 2011.
-
(2011)
IEEE Commun. Mag
, vol.49
, Issue.4
, pp. 36-43
-
-
Wu, G.1
Talwar, S.2
Johnsson, K.3
Himayat, N.4
Johnson, K.5
-
112
-
-
79953793010
-
Toward ubiquitous massive accessesin 3gpp machine-to-machine communications
-
Apr
-
S.-Y. Lien, K.-C. Chen, and Y. Lin, "Toward ubiquitous massive accessesin 3gpp machine-to-machine communications," IEEE Commun.Mag., vol. 49, no. 4, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Commun.Mag
, vol.49
, Issue.4
, pp. 66-74
-
-
Lien, S.-Y.1
Chen, K.-C.2
Lin, Y.3
-
114
-
-
77956877124
-
The internet of things: A survey,"Computer
-
Oct
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey,"Computer Networks, vol. 54, pp. 2787-2805, Oct. 2010.
-
(2010)
Networks
, vol.54
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
116
-
-
63049119529
-
Social network analysis for information flowin disconnected delay-tolerant manets
-
May
-
E. Daly and M. Haahr, "Social network analysis for information flowin disconnected delay-tolerant manets," IEEE Trans. Mobile Comput.,vol. 8, no. 5, pp. 606-621, May 2009.
-
(2009)
IEEE Trans. Mobile Comput
, vol.8
, Issue.5
, pp. 606-621
-
-
Daly, E.1
Haahr, M.2
-
117
-
-
13944249973
-
Centrality and network flow
-
DOI 10.1016/j.socnet.2004.11.008, PII S0378873304000693
-
S. P. and Borgatti, "Centrality and network flow," Social Networks,vol. 27, no. 1, pp. 55-71, 2005. (Pubitemid 40272649)
-
(2005)
Social Networks
, vol.27
, Issue.1
, pp. 55-71
-
-
Borgatti, S.P.1
-
118
-
-
84866527311
-
A survey of social-based routingin delay tolerant networks: Positive and negative social effects
-
Y. Zhu, B. Xu, X. Shi, and Y. Wang, "A survey of social-based routingin delay tolerant networks: Positive and negative social effects," IEEECommun. Surveys Tuts., vol. PP, no. 99, pp. 1-15, 2012.
-
(2012)
IEEECommun. Surveys Tuts.
, vol.PP
, Issue.99
, pp. 1-15
-
-
Zhu, Y.1
Xu, B.2
Shi, X.3
Wang, Y.4
-
119
-
-
80052863987
-
Cognitive radionetworking and communications: An overview
-
Sep
-
Y.-C. Liang, K.-C. Chen, G. Li, and P. Mahonen, "Cognitive radionetworking and communications: An overview," IEEE Trans. Veh.Technol., vol. 60, no. 7, pp. 3386-3407, Sep. 2011.
-
(2011)
IEEE Trans. Veh.Technol
, vol.60
, Issue.7
, pp. 3386-3407
-
-
Liang, Y.-C.1
Chen, K.-C.2
Li, G.3
Mahonen, P.4
-
120
-
-
79952553116
-
Radio resource management of selforganizingofdma wireless mesh networks
-
F. S. Chu and K. C. Chen, "Radio resource management of selforganizingofdma wireless mesh networks," Wireless Communicationsand Mobile Computing, vol. 11, no. 3, pp. 306-320, 2011.
-
(2011)
Wireless Communicationsand Mobile Computing
, vol.11
, Issue.3
, pp. 306-320
-
-
Chu, F.S.1
Chen, K.C.2
-
121
-
-
79959613287
-
On exploitingcognitive radio to mitigate interference in macro/femto heterogeneousnetworks
-
Jun
-
S.-M. Cheng, S.-Y. Lien, F.-S. Chu, and K.-C. Chen, "On exploitingcognitive radio to mitigate interference in macro/femto heterogeneousnetworks," IEEE Wireless Commun. Mag., vol. 18, no. 3, pp. 40-47,Jun. 2011.
-
(2011)
IEEE Wireless Commun. Mag
, vol.18
, Issue.3
, pp. 40-47
-
-
Cheng, S.-M.1
Lien, S.-Y.2
Chu, F.-S.3
Chen, K.-C.4
-
122
-
-
17144395505
-
Computing and communicating functions over sensor networks
-
DOI 10.1109/JSAC.2005.843543
-
A. Giridhar and P. Kumar, "Computing and communicating functionsover sensor networks," IEEE J. Sel. Areas Commun., vol. 23, no. 4,pp. 755-764, Apr. 2005. (Pubitemid 40519630)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.4
, pp. 755-764
-
-
Giridhar, A.1
Kumar, P.R.2
-
123
-
-
34248662954
-
In-network aggregation techniques for wireless sensor networks: A survey
-
DOI 10.1109/MWC.2007.358967
-
E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi, "In-network aggregationtechniques for wireless sensor networks: a survey," IEEE WirelessCommun. Mag., vol. 14, no. 2, pp. 70-87, Apr. 2007. (Pubitemid 46776305)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.2
, pp. 70-87
-
-
Fasolo, E.1
Rossi, M.2
Widmer, J.3
Zorzi, M.4
-
124
-
-
0030150820
-
The ceo problem [multiterminalsource coding]
-
May
-
T. Berger, Z. Zhang, and H. Viswanathan, "The ceo problem [multiterminalsource coding]," IEEE Trans. Inf. Theory, vol. 42, no. 3, pp.887-902, May 1996.
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.3
, pp. 887-902
-
-
Berger, T.1
Zhang, Z.2
Viswanathan, H.3
-
125
-
-
0015648934
-
Noiseless coding of correlated informationsources
-
Jul
-
D. Slepian and J. Wolf, "Noiseless coding of correlated informationsources," IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471-480, Jul.1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.2
-
126
-
-
78650883923
-
Minimum cost distributed source coding over anetwork
-
Jan
-
A. Ramamoorthy, "Minimum cost distributed source coding over anetwork," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 461-475, Jan.2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 461-475
-
-
Ramamoorthy, A.1
-
127
-
-
84883353036
-
Machine-to-machine communications: Technologies and challenge
-
to appear in
-
K.-C. Chen and F.-M. Tseng, "Machine-to-machine communications: Technologies and challenge," to appear in Ad Hoc Networks, 2013.
-
(2013)
Ad Hoc Networks
-
-
Chen, K.-C.1
Tseng, F.-M.2
-
128
-
-
84863044084
-
Opportunisticcooperative networking: To relay or not to relay?
-
Feb
-
X. Gong, T. Chandrashekhar, J. Zhang, and H. V. Poor, "Opportunisticcooperative networking: To relay or not to relay?" IEEE J. Sel. AreasCommun., vol. 30, no. 2, pp. 307-314, Feb. 2012.
-
(2012)
IEEE J. Sel. AreasCommun
, vol.30
, Issue.2
, pp. 307-314
-
-
Gong, X.1
Chandrashekhar, T.2
Zhang, J.3
Poor, H.V.4
-
129
-
-
80054816467
-
Dual-observation time-division spectrumsensing for cognitive radios
-
Oct
-
C.-H. Huang and K.-C. Chen, "Dual-observation time-division spectrumsensing for cognitive radios," IEEE Trans. Veh. Technol., vol. 60,no. 8, pp. 3712-3725, Oct. 2011.
-
(2011)
IEEE Trans. Veh. Technol
, vol.60
, Issue.8
, pp. 3712-3725
-
-
Huang, C.-H.1
Chen, K.-C.2
-
130
-
-
3042632320
-
Epidemicinformation dissemination in distributed systems
-
May
-
P. Eugster, R. Guerraoui, A.-M. Kermarrec, and L. Massoulie, "Epidemicinformation dissemination in distributed systems," IEEE Computer,vol. 37, no. 5, pp. 60-67, May 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.5
, pp. 60-67
-
-
Eugster, P.1
Guerraoui, R.2
Kermarrec, A.-M.3
Massoulie, L.4
-
131
-
-
58849089560
-
An epidemic theoretic framework for vulnerabilityanalysis of broadcast protocols in wireless sensor networks
-
Mar
-
P. De, Y. Liu, and S. Das, "An epidemic theoretic framework for vulnerabilityanalysis of broadcast protocols in wireless sensor networks,"IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 413-425, Mar. 2009.
-
(2009)
IEEE Trans. Mobile Comput
, vol.8
, Issue.3
, pp. 413-425
-
-
De, P.1
Liu, Y.2
Das, S.3
-
132
-
-
84867792489
-
Social-aware multicast indisruption-tolerant networks
-
W. Gao, Q. Li, B. Zhao, and G. Cao, "Social-aware multicast indisruption-tolerant networks," IEEE/ACM Trans. Netw., vol. PP, no. 99,p. 1, 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.1 PP
, Issue.99
-
-
Gao, W.1
Li, Q.2
Zhao, B.3
Cao, G.4
-
133
-
-
84863120532
-
Optimal control of epidemic informationdissemination in mobile ad hoc networks
-
Dec
-
P.-Y. Chen and K.-C. Chen, "Optimal control of epidemic informationdissemination in mobile ad hoc networks," in Proc. 2011 IEEE GlobalCommunications Conference, Dec. 2011, pp. 1-5.
-
(2011)
Proc. 2011 IEEE GlobalCommunications Conference
, pp. 1-5
-
-
Chen, P.-Y.1
Chen, K.-C.2
-
134
-
-
64149119332
-
Consensus and cooperationin networked multi-agent systems
-
Jan
-
R. Olfati-Saber, J. Fax, and R. Murray, "Consensus and cooperationin networked multi-agent systems," Proc. IEEE, vol. 95, no. 1, pp.215-233, Jan. 2007.
-
(2007)
Proc IEEE
, vol.95
, Issue.1
, pp. 215-233
-
-
Olfati-Saber, R.1
Fax, J.2
Murray, R.3
-
136
-
-
0027701548
-
A simple distributed autonomous powercontrol algorithm and its convergence
-
Nov
-
G. Foschini and Z. Miljanic, "A simple distributed autonomous powercontrol algorithm and its convergence," IEEE Trans. Veh. Technol.,vol. 42, no. 4, pp. 641-646, Nov. 1993.
-
(1993)
IEEE Trans. Veh. Technol
, vol.42
, Issue.4
, pp. 641-646
-
-
Foschini, G.1
Miljanic, Z.2
-
137
-
-
48449105712
-
Power control in wirelesscellular networks
-
Apr
-
M. Chiang, P. Hande, T. Lan, and C. W. Tan, "Power control in wirelesscellular networks," Foundations and Trends in Networking, vol. 2, pp.381-533, Apr. 2008.
-
(2008)
Foundations and Trends in Networking
, vol.2
, pp. 381-533
-
-
Chiang, M.1
Hande, P.2
Lan, T.3
Tan, C.W.4
-
138
-
-
0038589165
-
The anatomy of a large-scale hypertextual websearch engine
-
Apr
-
S. Brin and L. Page, "The anatomy of a large-scale hypertextual websearch engine," Computer Networks and ISDN Systems, vol. 30, pp.107-117, Apr. 1998.
-
(1998)
Computer Networks and ISDN Systems
, vol.30
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
141
-
-
85008044987
-
Matrix factorization techniquesfor recommender systems
-
Aug
-
Y. Koren, R. Bell, and C. Volinsky, "Matrix factorization techniquesfor recommender systems," IEEE Computer, vol. 42, no. 8, pp. 30-37,Aug. 2009.
-
(2009)
IEEE Computer
, vol.42
, Issue.8
, pp. 30-37
-
-
Koren, Y.1
Bell, R.2
Volinsky, C.3
-
142
-
-
36849079891
-
Modeling relationships at multiple scales to improve accuracy of large recommender systems
-
DOI 10.1145/1281192.1281206, KDD-2007: Proceedings of the Thirteenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
R. Bell, Y. Koren, and C. Volinsky, "Modeling relationships at multiplescales to improve accuracy of large recommender systems," in Proc.13th ACM SIGKDD International Conference on Knowledge Discoveryand Data Mining, 2007, pp. 95-104. (Pubitemid 350229196)
-
(2007)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 95-104
-
-
Bell, R.1
Koren, Y.2
Volinsky, C.3
-
143
-
-
49749086487
-
Scalable collaborative filtering with jointlyderived neighborhood interpolation weights
-
Oct
-
R. Bell and Y. Koren, "Scalable collaborative filtering with jointlyderived neighborhood interpolation weights," in Proc. Seventh IEEEInternational Conference on Data Mining, Oct. 2007, pp. 43-52.
-
(2007)
Proc. Seventh IEEEInternational Conference on Data Mining
, pp. 43-52
-
-
Bell, R.1
Koren, Y.2
-
145
-
-
67049164166
-
Collaborative filtering for implicitfeedback datasets
-
Dec
-
Y. Hu, Y. Koren, and C. Volinsky, "Collaborative filtering for implicitfeedback datasets," in Proc. Eighth IEEE International Conference onData Mining, Dec. 2008, pp. 263-272.
-
(2008)
Proc. Eighth IEEE International Conference on Data Mining
, pp. 263-272
-
-
Hu, Y.1
Koren, Y.2
Volinsky, C.3
-
146
-
-
0003579258
-
-
1st ed, Cambridge, University Press
-
S. Verdu, Multiuser Detection, 1st ed, Cambridge University Press,1998.
-
(1998)
Multiuser Detection
-
-
Verdu, S.1
-
147
-
-
0029698077
-
Activity detection in a multi-user environment
-
U. Mitra and H. V. Poor, "Activity detection in a multi-user environment,"Wireless Personal Communications, vol. 3, pp. 149-174, 1996. (Pubitemid 126714336)
-
(1996)
Wireless Personal Communications
, vol.3
, Issue.1-2
, pp. 149-174
-
-
Mitra, U.1
Poor, H.V.2
-
148
-
-
0032023746
-
Blind multiuser detection: A subspaceapproach
-
Mar
-
X. Wang and H. V. Poor, "Blind multiuser detection: A subspaceapproach," IEEE Trans. Inf. Theory, vol. 44, no. 2, pp. 677-690, Mar.1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.2
, pp. 677-690
-
-
Wang, X.1
Poor, H.V.2
-
149
-
-
0032319352
-
Identification of active users in synchronous CDMA multiuser detection
-
PII S0733871698086454
-
W.-C. Wu and K.-C. Chen, "Identification of active users in synchronouscdma multiuser detection," IEEE J. Sel. Areas Commun.,vol. 16, no. 9, pp. 1723-1735, Dec. 1998. (Pubitemid 128566853)
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.9
, pp. 1723-1735
-
-
Wu, W.-C.1
Chen, K.-C.2
-
150
-
-
0036477073
-
Online activity detection in a multiuser environment using the matrix CUSUM algorithm
-
DOI 10.1109/18.979323, PII S0018944802003139
-
T. Oskiper and H. V. Poor, "Online activity detection in a multiuserenvironment using the matrix CUSUM algorithm," IEEE Trans. Inf.Theory, vol. 48, no. 2, pp. 477-493, Feb. 2002. (Pubitemid 34491198)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.2
, pp. 477-493
-
-
Oskiper, T.1
Poor, H.V.2
-
151
-
-
47549103634
-
Multiuser detection in a dynamic environment- part I: User identification and data detection
-
Sep
-
E. Biglieri and M. Lops, "Multiuser detection in a dynamic environment- part I: User identification and data detection," IEEE Trans. Inf.Theory, vol. 53, no. 9, pp. 3158-3170, Sep. 2007.
-
(2007)
IEEE Trans. Inf.Theory
, vol.53
, Issue.9
, pp. 3158-3170
-
-
Biglieri, E.1
Lops, M.2
-
152
-
-
0036173585
-
Modeling social influence through networkautocorrelation: Constructing the weight matrix
-
R. Th.A.J. and Leenders, "Modeling social influence through networkautocorrelation: constructing the weight matrix," Social Networks,vol. 24, no. 1, pp. 21-47, 2002.
-
(2002)
Social Networks
, vol.24
, Issue.1
, pp. 21-47
-
-
Th., R.A.J.1
Leenders2
-
153
-
-
33747172362
-
Maximizing the spread ofinfluence through a social network
-
D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the spread ofinfluence through a social network," in Proc. Ninth ACM SIGKDDInternational Conference on Knowledge Discovery and Data Mining,2003, pp. 137-146.
-
(2003)
Proc. Ninth ACM SIGKDDInternational Conference on Knowledge Discovery and Data Mining
, pp. 137-146
-
-
Kempe, D.1
Kleinberg, J.2
Tardos, E.3
-
154
-
-
33745770240
-
Patterns of influence in arecommendation network
-
Lecture Notes in Computer Science, W.-K. Ng,M. Kitsuregawa, J. Li, and K. Chang, Eds, Springer
-
J. Leskovec, A. Singh, and J. Kleinberg, "Patterns of influence in arecommendation network," in Advances in Knowledge Discovery andData Mining, ser. Lecture Notes in Computer Science, W.-K. Ng,M. Kitsuregawa, J. Li, and K. Chang, Eds. Springer, 2006, vol. 3918,pp. 380-389.
-
(2006)
Advances in Knowledge Discovery and Data Mining, ser
, vol.3918
, pp. 380-389
-
-
Leskovec, J.1
Singh, A.2
Kleinberg, J.3
-
155
-
-
0034408816
-
Broadcasting on trees and the ising model
-
May
-
W. Evans, C. Kenyon, Y. Peres, and L. J. Schulman, "Broadcasting on Trees and the Ising Model," The Annals of Applied Probability, vol. 10,no. 2, pp. 410-433, May 2000.
-
(2000)
The Annals of Applied Probability
, vol.10
, Issue.2
, pp. 410-433
-
-
Evans, W.1
Kenyon, C.2
Peres, Y.3
Schulman, L.J.4
-
156
-
-
70449476525
-
Influence in a large society: Interplaybetween information dynamics and network structure
-
Jul
-
L. Dolecek and D. Shah, "Influence in a large society: Interplaybetween information dynamics and network structure," in Proc. IEEEInternational Symposium on Information Theory, Jul. 2009, pp. 1574-1578.
-
(2009)
Proc. IEEEInternational Symposium on Information Theory
, pp. 1574-1578
-
-
Dolecek, L.1
Shah, D.2
-
157
-
-
77956221415
-
Inferring networksof diffusion and influence
-
M. Gomez Rodriguez, J. Leskovec, and A. Krause, "Inferring networksof diffusion and influence," in Proc. 16th ACM SIGKDD InternationalConference on Knowledge Discovery and Data Mining, 2010, pp.1019-1028.
-
(2010)
Proc. 16th ACM SIGKDD InternationalConference on Knowledge Discovery and Data Mining
, pp. 1019-1028
-
-
Gomez Rodriguez, M.1
Leskovec, J.2
Krause, A.3
-
159
-
-
79952928821
-
Economic models of communication networks
-
Z. Liu and C. H. Xia, Eds, Springer
-
J. Walrand, "Economic models of communication networks," in PerformanceModeling and Engineering, Z. Liu and C. H. Xia, Eds.Springer, 2008, pp. 57-89.
-
(2008)
PerformanceModeling and Engineering
, pp. 57-89
-
-
Walrand, J.1
-
160
-
-
0014413249
-
The tragedy of the commons
-
G. Hardin, "The tragedy of the commons," Science, vol. 162, no. 3859,pp. 1243-1248, 1968.
-
(1968)
Science
, vol.162
, Issue.3859
, pp. 1243-1248
-
-
Hardin, G.1
-
161
-
-
0033359397
-
Providing Internet access: What we learn from INDEX
-
DOI 10.1109/65.793687
-
R. Edell and P. Varaiya, "Providing internet access: What we learnfrom index," IEEE Netw., vol. 13, no. 5, pp. 18-25, Sep./Oct. 1999. (Pubitemid 30503464)
-
(1999)
IEEE Network
, vol.13
, Issue.5
, pp. 18-25
-
-
Edell, R.1
Varaiya, P.2
-
162
-
-
77953305820
-
Pricing underconstraints in access networks: Revenue maximization and congestionmanagement
-
Mar
-
P. Hande, M. Chiang, R. Calderbank, and J. Zhang, "Pricing underconstraints in access networks: Revenue maximization and congestionmanagement," in Proc. IEEE INFOCOM 2010, Mar. 2010, pp. 1-9.
-
(2010)
Proc IEEE INFOCOM 2010
, pp. 1-9
-
-
Hande, P.1
Chiang, M.2
Calderbank, R.3
Zhang, J.4
-
164
-
-
0032027247
-
Rate control for communication networks: Shadow prices, proportional fairness and stability
-
F. P. Kelly, A. K. Maulloo, and D. K. H. Tan, "Rate control forcommunication networks: Shadow prices, proportional fairness andstability," The Journal of the Operational Research Society, vol. 49,no. 3, pp. 237-252, 1998. (Pubitemid 128610018)
-
(1998)
Journal of the Operational Research Society
, vol.49
, Issue.3
, pp. 237-252
-
-
Kelly, F.P.1
Maulloo, A.K.2
Tan, D.3
-
165
-
-
64149123172
-
Layering asoptimization decomposition: A mathematical theory of network architectures
-
Jan
-
M. Chiang, S. Low, A. Calderbank, and J. Doyle, "Layering asoptimization decomposition: A mathematical theory of network architectures,"Proc. IEEE, vol. 95, no. 1, pp. 255-312, Jan. 2007.
-
(2007)
Proc IEEE
, vol.95
, Issue.1
, pp. 255-312
-
-
Chiang, M.1
Low, S.2
Calderbank, A.3
Doyle, J.4
-
166
-
-
79952988709
-
Repeated auctions with bayesiannonparametric learning for spectrum access in cognitive radio networks
-
Mar
-
Z. Han, R. Zheng, and H. V. Poor, "Repeated auctions with bayesiannonparametric learning for spectrum access in cognitive radio networks,"IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 890-900,Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.3
, pp. 890-900
-
-
Han, Z.1
Zheng, R.2
Poor, H.V.3
-
167
-
-
50649122537
-
Auction-based resourceallocation for cooperative communications
-
Sep
-
J. Huang, Z. Han, M. Chiang, and H. V. Poor, "Auction-based resourceallocation for cooperative communications," IEEE J. Sel. Areas Commun.,vol. 26, no. 7, pp. 1226-1237, Sep. 2008.
-
(2008)
IEEE J. Sel. Areas Commun
, vol.26
, Issue.7
, pp. 1226-1237
-
-
Huang, J.1
Han, Z.2
Chiang, M.3
Poor, H.V.4
-
168
-
-
84859184556
-
The economic effects ofsharing femtocells
-
Apr
-
S.-Y. Yun, Y. Yi, D.-H. Cho, and J. Mo, "The economic effects ofsharing femtocells," IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp.595-606, Apr. 2012.
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.3
, pp. 595-606
-
-
Yun, S.-Y.1
Yi, Y.2
Cho, D.-H.3
Mo, J.4
-
169
-
-
84875617823
-
A predator-prey model fordynamics of cognitive radios
-
to appear in
-
D. Liau, K.-C. Chen, and S.-M. Cheng, "A predator-prey model fordynamics of cognitive radios," to appear in IEEE Commun. Lett., 2013.
-
(2013)
IEEE Commun. Lett
-
-
Liau, D.1
Chen, K.-C.2
Cheng, S.-M.3
-
170
-
-
84855430904
-
Nash bargaining game theoretic schedulingfor joint channel and power allocation in cognitive radio systems
-
Jan
-
Q. Ni and C. Zarakovitis, "Nash bargaining game theoretic schedulingfor joint channel and power allocation in cognitive radio systems,"IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 70-81, Jan. 2012.
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.1
, pp. 70-81
-
-
Ni, Q.1
Zarakovitis, C.2
-
171
-
-
79957645250
-
Game theoretic analysis for spectrumsharing with multi-hop relaying
-
May
-
Y. Xiao, G. Bi, and D. Niyato, "Game theoretic analysis for spectrumsharing with multi-hop relaying," IEEE Trans. Wireless Commun.,vol. 10, no. 5, pp. 1527-1537, May 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.5
, pp. 1527-1537
-
-
Xiao, Y.1
Bi, G.2
Niyato, D.3
-
172
-
-
79960556980
-
Cognitive and game-theoreticalradio resource management for autonomous femtocells with qos guarantees
-
Jul
-
S.-Y. Lien, Y.-Y. Lin, and K.-C. Chen, "Cognitive and game-theoreticalradio resource management for autonomous femtocells with qos guarantees,"IEEE Trans. Wireless Commun., vol. 10, no. 7, pp. 2196-2206,Jul. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.7
, pp. 2196-2206
-
-
Lien, S.-Y.1
Lin, Y.-Y.2
Chen, K.-C.3
-
173
-
-
84655162799
-
Cognitive base stations in LTE/3GPPfemtocells: A correlated equilibrium game-theoretic approach
-
Dec
-
J. Huang and V. Krishnamurthy, "Cognitive base stations in LTE/3GPPfemtocells: A correlated equilibrium game-theoretic approach," IEEE Trans. Commun., vol. 59, no. 12, pp. 3485-3493, Dec. 2011.
-
(2011)
IEEE Trans. Commun
, vol.59
, Issue.12
, pp. 3485-3493
-
-
Huang, J.1
Krishnamurthy, V.2
-
174
-
-
84855424186
-
Selfish randomaccess over wireless channels with multipacket reception
-
Jan
-
H. Inaltekin, M. Chiang, H. V. Poor, and S. B. Wicker, "Selfish randomaccess over wireless channels with multipacket reception," IEEE J. Sel.Areas Commun., vol. 30, no. 1, pp. 138-152, Jan. 2012.
-
(2012)
IEEE J. Sel.Areas Commun
, vol.30
, Issue.1
, pp. 138-152
-
-
Inaltekin, H.1
Chiang, M.2
Poor, H.V.3
Wicker, S.B.4
-
175
-
-
84862907827
-
Asynchronous dynamic spectrum access
-
Jan
-
Y.-Y. Lin and K.-C. Chen, "Asynchronous dynamic spectrum access,"IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 222-236, Jan. 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.1
, pp. 222-236
-
-
Lin, Y.-Y.1
Chen, K.-C.2
-
176
-
-
79960561681
-
Ecology of cognitive radioad hoc networks
-
Jul
-
S.-M. Cheng, P.-Y. Chen, and K.-C. Chen, "Ecology of cognitive radioad hoc networks," IEEE Commun. Lett., vol. 15, no. 7, pp. 764-766,Jul. 2011.
-
(2011)
IEEE Commun. Lett
, vol.15
, Issue.7
, pp. 764-766
-
-
Cheng, S.-M.1
Chen, P.-Y.2
Chen, K.-C.3
-
177
-
-
58149127238
-
Collective cognition in animal groups
-
I. D. and Couzin, "Collective cognition in animal groups," Trends inCognitive Sciences, vol. 13, no. 1, pp. 36-43, 2009.
-
(2009)
Trends InCognitive Sciences
, vol.13
, Issue.1
, pp. 36-43
-
-
Couzin, I.D.1
-
178
-
-
78049367748
-
Evidence for a collective intelligence factor in the performanceof human groups
-
A. W. Woolley, C. F. Chabris, A. Pentland, N. Hashmi, and T. W. Malone,"Evidence for a collective intelligence factor in the performanceof human groups," Science, vol. 330, no. 6004, pp. 686-688, 2010.
-
(2010)
Science
, vol.330
, Issue.6004
, pp. 686-688
-
-
Woolley, A.W.1
Chabris, C.F.2
Pentland, A.3
Hashmi, N.4
Malone, T.W.5
-
179
-
-
0002283033
-
From data mining toknowledge discovery in databases
-
U. Fayyad, G. Piatetsky-shapiro, and P. Smyth, "From data mining toknowledge discovery in databases," AI Magazine, vol. 17, pp. 37-54,1996.
-
(1996)
AI Magazine
, vol.17
, pp. 37-54
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
180
-
-
0033899045
-
Graph-based data mining
-
D. Cook and L. Holder, "Graph-based data mining," IEEE Intell. Syst.,vol. 15, no. 2, pp. 32-41, Mar./Apr. 2000. (Pubitemid 30587666)
-
(2000)
IEEE Intelligent Systems and Their Applications
, vol.15
, Issue.2
, pp. 32-41
-
-
Cook, D.J.1
Holder, L.B.2
-
182
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee,"Measurement and analysis of online social networks," inProc. 7th ACM SIGCOMM Conference on Internet Measurement, 2007,pp. 29-42.
-
(2007)
Proc. 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
183
-
-
67149084291
-
Clustering high-dimensionaldata: A survey on subspace clustering, pattern-based clustering, andcorrelation clustering
-
Mar
-
H.-P. Kriegel, P. Kröger, and A. Zimek, "Clustering high-dimensionaldata: A survey on subspace clustering, pattern-based clustering, andcorrelation clustering," ACM Trans. Knowl. Discov. Data, vol. 3, pp.1:1-1:58, Mar. 2009.
-
(2009)
ACM Trans. Knowl. Discov. Data
, vol.3
, pp. 11-158
-
-
Kriegel, H.-P.1
Kröger, P.2
Zimek, A.3
-
187
-
-
0022034007
-
Robust techniques for signal processing: A survey
-
S. Kassam and H. V. Poor, "Robust techniques for signal processing:A survey," Proc. IEEE, vol. 73, no. 3, pp. 433-481, Mar. 1985. (Pubitemid 15110686)
-
(1985)
Proceedings of the IEEE
, vol.73
, Issue.3
, pp. 433-481
-
-
Kassam, S.A.1
Poor, H.V.2
|