-
1
-
-
57749196696
-
Stabbing convex polygons with a segment or a polygon
-
Sep
-
P. K. Agarwal, D. Z. Chen, S. K. Ganjugunte, E. e. Misio, M. Sharir, andK. Tang, "Stabbing convex polygons with a segment or a polygon," in Proc. ESA, Sep. 2008, pp. 52-63.
-
(2008)
Proc. ESA
, pp. 52-63
-
-
Agarwal, P.K.1
Chen, D.Z.2
Ganjugunte, S.K.3
Misio E, E.4
Sharir, M.5
Tang, K.6
-
2
-
-
79951617247
-
Network vulnerability to single, multiple, and probabilistic physical attacks
-
Nov
-
P. K. Agarwal, A. Efrat, S. K. Ganjugunte, D. Hay, S. Sankararaman, and G. Zussman, "Network vulnerability to single, multiple, and probabilistic physical attacks," in Proc. MILCOM, Nov. 2010, pp. 1824-1829.
-
(2010)
Proc. MILCOM
, pp. 1824-1829
-
-
Agarwal, P.K.1
Efrat, A.2
Ganjugunte, S.K.3
Hay, D.4
Sankararaman, S.5
Zussman, G.6
-
3
-
-
79960864959
-
The resilience of WDM networks to probabilistic geographical failures
-
Apr
-
P. K. Agarwal, A. Efrat, S. K. Ganjugunte, D. Hay, S. Sankararaman, and G. Zussman, "The resilience of WDM networks to probabilistic geographical failures," in Proc. IEEE INFOCOM, Apr. 2011, pp. 1521-1529.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1521-1529
-
-
Agarwal, P.K.1
Efrat, A.2
Ganjugunte, S.K.3
Hay, D.4
Sankararaman, S.5
Zussman, G.6
-
4
-
-
80052342411
-
-
University of Arizona, Tucson, AZ, Tech. Rep., [Online]. Available
-
P. K. Agarwal, A. Efrat, S. K. Ganjugunte, D. Hay, S. Sankararaman, and G. Zussman, "The resilience of WDM networks to probabilistic geographical failures," University of Arizona, Tucson, AZ, Tech. Rep., 2011 [Online]. Available: http://www.cs.huji.ac.il/~dhay/publications/ AEGHSZNetResReport.pdf
-
(2011)
The Resilience of WDM Networks to Probabilistic Geographical Failures
-
-
Agarwal, P.K.1
Efrat, A.2
Ganjugunte, S.K.3
Hay, D.4
Sankararaman, S.5
Zussman, G.6
-
5
-
-
84938067527
-
Translating a planar object to maximize point containment
-
P. K. Agarwal, T. Hagerup, R. Ray, M. Sharir,M. H.M. Smid, and E. Welzl, "Translating a planar object to maximize point containment," in Proc. 10th Annu. ESA, 2002, pp. 42-53.
-
(2002)
Proc. 10th Annu. ESA
, pp. 42-53
-
-
Agarwal, P.K.1
Hagerup, T.2
Ray, R.3
Sharir, M.H.M.4
Smid, M.5
Welzl, E.6
-
8
-
-
77957036347
-
Network reliability
-
ser. Handbooks in Operations Research andManagement Science. Amsterdam, The Netherlands: Elsevier ch. 11
-
M. O. Ball, C. J. Colbourn, and J. S. Provan, "Network reliability," in Network Models, ser. Handbooks in Operations Research andManagement Science. Amsterdam, The Netherlands: Elsevier, 1995, vol. 7, ch. 11, pp. 673-62.
-
(1995)
Network Models
, vol.7
, pp. 673-762
-
-
Ball, M.O.1
Colbourn, C.J.2
Provan, J.S.3
-
9
-
-
0038483826
-
Emergence of scaling in random networks
-
Oct
-
A. L. Barabasi and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509-512, Oct. 1999.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, A.L.1
Albert, R.2
-
11
-
-
70349727170
-
Some generalized max-flow min-cut problems in the plane
-
D. Bienstock, "Some generalized max-flow min-cut problems in the plane," Math. Oper. Res., vol. 16, no. 2, pp. 310-333, 1991.
-
(1991)
Math. Oper. Res.
, vol.16
, Issue.2
, pp. 310-333
-
-
Bienstock, D.1
-
12
-
-
84855722662
-
-
MIT Technol. Rev. [Online]. Available
-
J. Borland, "Analyzing the Internet collapse," MIT Technol. Rev. 2008 [Online]. Available: http://www.technologyreview. com/Infotech/20152/? a=f
-
(2008)
Analyzing the Internet Collapse
-
-
Borland, J.1
-
13
-
-
26044461304
-
Identifying critical infrastructure: The median and covering facility interdiction problems
-
DOI 10.1111/j.1467-8306.2004.00410.x
-
R. L. Church, M. P. Scaparra, and R. S. Middleton, "Identifying critical infrastructure: The median and covering facility interdiction problems," Ann. Assoc. Amer. Geographers, vol. 94, no. 3, pp. 491-502, 2004. (Pubitemid 41716604)
-
(2004)
Annals of the Association of American Geographers
, vol.94
, Issue.3
, pp. 491-502
-
-
Church, R.L.1
Scaparra, M.P.2
Middleton, R.S.3
-
14
-
-
79960861815
-
Lessons learned from CORONET
-
Mar
-
G. Clapp, R. Doverspike, R. Skoog, J. Strand, and A. V. Lehmen, "Lessons learned from CORONET," in Proc. OSA OFC, Mar. 2010, p. 1.
-
(2010)
Proc. OSA OFC
, pp. 1
-
-
Clapp, G.1
Doverspike, R.2
Skoog, R.3
Strand, J.4
Lehmen, A.V.5
-
15
-
-
0001702902
-
Applications of random sampling in computational geometry, II
-
Sep
-
K. L. Clarkson and P. W. Shor, "Applications of random sampling in computational geometry, II," Discrete Comput. Geom., vol. 4, pp. 387-421, Sep. 1989.
-
(1989)
Discrete Comput. Geom.
, vol.4
, pp. 387-421
-
-
Clarkson, K.L.1
Shor, P.W.2
-
17
-
-
0034205406
-
Protection interoperability for WDM optical networks
-
Jun
-
O. Crochat, J.-Y. Le Boudec, and O. Gerstel, "Protection interoperability for WDM optical networks," IEEE/ACM Trans. Netw., vol. 8, no. 3, pp. 384-395, Jun. 2000.
-
(2000)
EE/ACM Trans. Netw.
, vol.8
, Issue.3
, pp. 384-395
-
-
Crochat, O.1
Le Boudec, J.-Y.2
Gerstel, O.3
-
18
-
-
84859973015
-
On new approaches of assessing network vulnerability: Hardness and approximation
-
Apr
-
N. Dinh, Y. Xuan, M. T. Thai, P. Pardalos, and T. Znati, "On new approaches of assessing network vulnerability: Hardness and approximation," IEEE/ACM Trans. Netw., vol. 20, no. 2, pp. 609-619, Apr. 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.2
, pp. 609-619
-
-
Dinh, N.1
Xuan, Y.2
Thai, M.T.3
Pardalos, P.4
Znati, T.5
-
19
-
-
77953295879
-
On approximation of new optimization methods for assessing network vulnerability
-
Mar
-
N.Dinh, Y. Xuan,M.T.Thai, E. K. Park, andT. Znati, "On approximation of new optimization methods for assessing network vulnerability," in Proc. IEEE INFOCOM, Mar. 2010, pp. 2678-2686.
-
(2010)
Proc. IEEE INFOCOM
, pp. 2678-2686
-
-
Dinh, N.1
Xuan, Y.2
Thai, M.T.3
Park, E.K.4
Znati, T.5
-
21
-
-
82855161719
-
-
Apr
-
J. S. Foster, E. Gjelde,W. R. Graham, R. J. Hermann, H. M. Kluepfel, R. L. Lawson, G. K. Soper, L. L. Wood, and J. B. Woodard, "Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack, critical national infrastructures," Apr. 2008.
-
(2008)
Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, Critical National Infrastructures
-
-
Foster, J.S.1
Gjeldew. Graham R, E.2
Hermann, R.J.3
Kluepfel, H.M.4
Lawson, R.L.5
Soper, G.K.6
Wood, L.L.7
Woodard, J.B.8
-
23
-
-
27144491076
-
Stability and topology of scale-free networks under attack and defense strategies
-
L. K. Gallos, R. Cohen, P. Argyrakis, A. Bunde, and S. Havlin, "Stability and topology of scale-free networks under attack and defense strategies," Phys. Rev. Lett., vol. 94, no. 18, p. 188701, 2005.
-
(2005)
Ys. Rev. Lett.
, vol.94
, Issue.18
, pp. 188701
-
-
Gallos, L.K.1
Cohen, R.2
Argyrakis, P.3
Bunde, A.4
Havlin, S.5
-
24
-
-
84887086818
-
-
Ph.D. dissertation, Duke University, Durham, NC
-
S. K. Ganjugunte, "Geometric hitting sets and their variants," Ph.D. dissertation, Duke University, Durham, NC, 2011.
-
(2011)
Geometric Hitting Sets and Their Variants
-
-
Ganjugunte, S.K.1
-
26
-
-
26844532518
-
Resilient routing layers for network disaster planning
-
Networking - ICN 2005 - 4th International Conference on Networking, Proceedings
-
A. F. Hansen, A. Kvalbein, T. Cicic, and S. Gjessing, "Resilient routing layers for network disaster planning," in Proc. ICN, Apr. 2005, pp. 1097-1105. (Pubitemid 41452219)
-
(2005)
Lecture Notes in Computer Science
, vol.3421
, pp. 1097-1105
-
-
Hansen, A.F.1
Kvalbein, A.2
Cicic, T.3
Gjessing, S.4
-
27
-
-
79951651475
-
Dynamic load balancing for robust distributed computing in the presence of topological impairments
-
Hoboken, NJ: Wiley
-
M. M. Hayat, J. E. Pezoa, D. Dietz, and S. Dhakal, "Dynamic load balancing for robust distributed computing in the presence of topological impairments," in Wiley Handbook of Science and Technology for Homeland Security. Hoboken, NJ: Wiley, 2009.
-
(2009)
Wiley Handbook of Science and Technology for Homeland Security.
-
-
Hayat, M.M.1
Pezoa, J.E.2
Dietz, D.3
Dhakal, S.4
-
28
-
-
0032164214
-
Analysis of the greedy approach in problems of maximum k-coverage
-
D. Hochbaum and A. Pathria, "Analysis of the greedy approach in problems of maximum k-coverage," Naval Res. Logistics, vol. 45, no. 6, pp. 615-627, 1998. (Pubitemid 128581605)
-
(1998)
Naval Research Logistics
, vol.45
, Issue.6
, pp. 615-627
-
-
Hochbaum, D.S.1
Pathria, A.2
-
29
-
-
0004298302
-
-
Internet Working Group, Internet Draft, Nov. 2001 [Online]. Available
-
IETF Internet Working Group, "Inference of shared risk link groups," Internet Draft, Nov. 2001 [Online]. Available: http://tools.ietf.org/ html/draft-many-inference-srlg-02
-
Inference of Shared Risk Link Groups
-
-
-
30
-
-
0035439423
-
A randomized fully polynomial time approximation scheme for the all-terminal network reliability problem
-
DOI 10.1137/S0036144501387141, PII S0036144501387141
-
D. R. Karger, "A randomized fully polynomial time approximation scheme for the all-terminal network reliability problem," SIAM Rev., vol. 43, no. 3, pp. 499-522, 2001. (Pubitemid 32991212)
-
(2001)
SIAM Review
, vol.43
, Issue.3
, pp. 499-522
-
-
Karger, D.R.1
-
31
-
-
0030823074
-
Implementing a fully polynomial time approximation scheme for all terminal network reliability
-
Jan
-
D. R. Karger and R. P. Tai, "Implementing a fully polynomial time approximation scheme for all terminal network reliability," in Proc. ACM-SIAM SODA, Jan. 1997, pp. 334-343.
-
(1997)
Proc. ACM-SIAM SODA
, pp. 334-343
-
-
Karger, D.R.1
Tai, R.P.2
-
32
-
-
84887085381
-
-
Communications, Broomfield, CO, [Online]. Available
-
Level 3 Communications, Broomfield, CO, "Networkmap," 2012 [Online]. Available: http://maps.level3.com
-
(2012)
Networkmap
-
-
-
33
-
-
61449238132
-
Scalability of network-failure resilience: Analysis using multi-layer probabilistic graphical models
-
Feb
-
G. Liu and C. Ji, "Scalability of network-failure resilience: Analysis using multi-layer probabilistic graphical models," IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 319-331, Feb. 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 319-331
-
-
Liu, G.1
Ji, C.2
-
34
-
-
0042025141
-
Tearing down the Internet
-
Aug
-
D. Magoni, "Tearing down the Internet," IEEE J. Sel. Areas Commun., vol. 21, no. 6, pp. 949-960, Aug. 2003.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.6
, pp. 949-960
-
-
Magoni, D.1
-
36
-
-
6944229536
-
Physical topology design for survivable routing of logical rings in WDM-based networks
-
Oct
-
A. Narula-Tam, E.Modiano, and A. Brzezinski, "Physical topology design for survivable routing of logical rings in WDM-based networks," IEEE J. Sel. Areas Commun., vol. 22, no. 8, pp. 1525-1538, Oct. 2004.
-
(2004)
IEEE J. Sel. Areas Commun.
, vol.22
, Issue.8
, pp. 1525-1538
-
-
Narula-Tam, A.1
Modiano, E.2
Brzezinski, A.3
-
37
-
-
0000095809
-
An analysis of approximations for maximizing submodular set functions-I
-
Dec
-
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, "An analysis of approximations for maximizing submodular set functions-I," Math. Prog., vol. 14, no. 1, pp. 265-294, Dec. 1978.
-
(1978)
Math. Prog.
, vol.14
, Issue.1
, pp. 265-294
-
-
Nemhauser, G.L.1
Wolsey, L.A.2
Fisher, M.L.3
-
38
-
-
77953317622
-
Network reliability with geographically correlated failures
-
Mar
-
S. Neumayer and E. Modiano, "Network reliability with geographically correlated failures," in Proc. IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Neumayer, S.1
Modiano, E.2
-
39
-
-
70349686850
-
Assessing the vulnerability of the fiber infrastructure to disasters
-
Apr
-
S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the vulnerability of the fiber infrastructure to disasters," in Proc. IEEE INFOCOM, Apr. 2009, pp. 1566-1574.
-
(2009)
Proc. IEEE INFOCOM
, pp. 1566-1574
-
-
Neumayer, S.1
Zussman, G.2
Cohen, R.3
Modiano, E.4
-
40
-
-
62349108771
-
Assessing the impact of geographically correlated network failures
-
Nov
-
S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the impact of geographically correlated network failures," in Proc. IEEE MILCOM, Nov. 2008.
-
(2008)
Proc. IEEE MILCOM
-
-
Neumayer, S.1
Zussman, G.2
Cohen, R.3
Modiano, E.4
-
42
-
-
0027188162
-
The network inhibition problem
-
May
-
C. A. Phillips, "The network inhibition problem," in Proc. ACM STOC, May 1993, pp. 776-785.
-
(1993)
Proc. ACM STOC
, pp. 776-785
-
-
Phillips, C.A.1
-
43
-
-
77951271507
-
-
Lawrence Berkeley National Laboratory, Berkeley, CA, Tech. Rep. LBNL-62142
-
A. Pinar, Y. Fogel, and B. Lesieutre, "The inhibiting bisection problem," Lawrence Berkeley National Laboratory, Berkeley, CA, Tech. Rep. LBNL-62142, 2006.
-
(2006)
The Inhibiting Bisection Problem
-
-
Pinar, A.1
Fogel, Y.2
Lesieutre, B.3
-
44
-
-
84875952664
-
-
Denver, CO [Online]. Available
-
Qwest, Denver, CO, "Network map," 2012 [Online]. Available: http:// www.qwest.com/largebusiness/enterprisesolutions/networkMaps/
-
(2012)
Network Map
-
-
-
45
-
-
80052979472
-
Modeling stochastic correlated failures and their effects on network reliability
-
Aug
-
M. Rahnamay-Naeini, J. Pezoa, G. Azar, N. Ghani, and M. Hayat, "Modeling stochastic correlated failures and their effects on network reliability," in Proc. IEEE ICCCN, Aug. 2011.
-
(2011)
Proc. IEEE ICCCN
-
-
Rahnamay-Naeini, M.1
Pezoa, J.2
Azar, G.3
Ghani, N.4
Hayat, M.5
-
46
-
-
74949099389
-
Region-based connectivity: A new paradigm for design of fault-tolerant networks
-
A. Sen, S. Murthy, and S. Banerjee, "Region-based connectivity: A new paradigm for design of fault-tolerant networks," in Proc. IEEE HPSR, 2009.
-
(2009)
Proc. IEEE HPSR
-
-
Sen, A.1
Murthy, S.2
Banerjee, S.3
-
47
-
-
39049126617
-
Fault-tolerance in sensor networks: A new evaluation metric
-
Apr
-
A. Sen, B. Shen, L. Zhou, and B. Hao, "Fault-tolerance in sensor networks: A new evaluation metric," in Proc. IEEE INFOCOM, Apr. 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Sen, A.1
Shen, B.2
Zhou, L.3
Hao, B.4
-
51
-
-
84898318004
-
Dependent failures in data communication systems
-
Dec
-
J. Spragins, "Dependent failures in data communication systems," IEEE Trans. Commun., vol. COM-25, no. 12, pp. 1494-1499, Dec. 1977.
-
(1977)
IEEE Trans. Commun.
, vol.COM-25
, Issue.12
, pp. 1494-1499
-
-
Spragins, J.1
-
52
-
-
84883370531
-
Evaluation of network resilience, survivability, and disruption tolerance: Analysis, topology generation, simulation, and experimentation (invited paper)
-
to be published
-
J. P. Sterbenz, E. K. Çetinkaya,M. A. Hameed, A. Jabbar, Q. Shi, and J. P. Rohrer, "Evaluation of network resilience, survivability, and disruption tolerance: Analysis, topology generation, simulation, and experimentation (invited paper)," Telecommun. Syst., 2011, to be published.
-
(2011)
Telecommun. Syst.
-
-
Sterbenz, J.P.1
Çetinkaya, M.A.2
Hameed, M.A.3
Jabbar, A.4
Shi, Q.5
Rohrer, J.P.6
-
53
-
-
76349096468
-
Resilience in computer systems and networks
-
Nov
-
K. Trivedi, D. S. Kim, and R. Ghosh, "Resilience in computer systems and networks," in Proc. IEEE/ACM ICCAD, Nov. 2009, pp. 74-77.
-
(2009)
Proc. IEEE/ACM ICCAD
, pp. 74-77
-
-
Trivedi, K.1
Kim, D.S.2
Ghosh, R.3
-
54
-
-
63549104205
-
High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments
-
[Online]. Available
-
C. Wilson, "High altitude electromagnetic pulse (HEMP) and high power microwave (HPM) devices: Threat assessments," CRS Rep. for Congress, 2008 [Online]. Available: http://www.ntia.doc. gov/broadbandgrants/comments/ 7926.pdf
-
(2008)
CRS Rep. for Congress
-
-
Wilson, C.1
-
55
-
-
70350131484
-
Topology design of undersea cables considering survivability under major disasters
-
May
-
W. Wu, B. Moran, J. Manton, and M. Zukerman, "Topology design of undersea cables considering survivability under major disasters," in Proc. WAINA, May 2009, pp. 1154-1159.
-
(2009)
Proc. WAINA
, pp. 1154-1159
-
-
Wu, W.1
Moran, B.2
Manton, J.3
Zukerman, M.4
-
56
-
-
84875952664
-
-
Herndon, VA, [Online]. Available
-
XO Communications, Herndon, VA, "Network map," 2012 [Online]. Available: http://www.xo.com/about/network/Pages/maps.aspx
-
(2012)
Network Map
-
-
-
57
-
-
0003011630
-
Survivability in optical networks
-
Nov.-Dec
-
D. Zhou and S. Subramaniam, "Survivability in optical networks," IEEE Netw., vol. 14, no. 6, pp. 16-23, Nov.-Dec. 2000.
-
(2000)
IEEE Netw.
, vol.14
, Issue.6
, pp. 16-23
-
-
Zhou, D.1
Subramaniam, S.2
|