-
1
-
-
77956877124
-
The Internet of Things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey, " Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
78650921155
-
From today's INTRAnet of things to a future INTERnet of Things: A wireless-and mobilityrelated view
-
Dec
-
M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, "From today's INTRAnet of things to a future INTERnet of Things: A wireless-and mobilityrelated view, " IEEE Wireless Commun. Mag., vol. 17, no. 6, pp. 44-51, Dec. 2010.
-
(2010)
IEEE Wireless Commun. Mag.
, vol.17
, Issue.6
, pp. 44-51
-
-
Zorzi, M.1
Gluhak, A.2
Lange, S.3
Bassi, A.4
-
3
-
-
79953792812
-
Toward intelligent machine-to-machine communications in smart grid
-
Apr
-
Z. Fadlullah et al., "Toward intelligent machine-to-machine communications in smart grid, " IEEE Commun. Mag., vol. 49, no. 4, pp. 60-65, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 60-65
-
-
Fadlullah, Z.1
-
4
-
-
79953784283
-
M2M: From mobile to embedded Internet
-
Apr
-
G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, "M2M: From mobile to embedded Internet, " IEEE Commun. Mag., vol. 49, no. 4, pp. 36-43, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 36-43
-
-
Wu, G.1
Talwar, S.2
Johnsson, K.3
Himayat, N.4
Johnson, K.5
-
5
-
-
79953778099
-
Home M2M networks: Architectures, standards, and QoS improvement
-
Apr
-
Y. Zhang et al., "Home M2M networks: Architectures, standards, and QoS improvement, " IEEE Commun. Mag., vol. 49, no. 4, pp. 44-52, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 44-52
-
-
Zhang, Y.1
-
6
-
-
79953793010
-
Toward ubiquitous massive accesses in 3GPP machine-to-machine communications
-
Apr
-
S.-Y. Lien, K.-C. Chen, and Y. Lin, "Toward ubiquitous massive accesses in 3GPP machine-to-machine communications, " IEEE Commun. Mag., vol. 49, no. 4, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 66-74
-
-
Lien, S.-Y.1
Chen, K.-C.2
Lin, Y.3
-
7
-
-
84899514248
-
Machine-to-machine communications: Technologies and challenges
-
Jul.
-
K.-C. Chen and S.-Y. Lien, "Machine-to-machine communications: Technologies and challenges, " Ad Hoc Netw., vol. 18, pp. 3-23, Jul. 2014.
-
(2014)
Ad Hoc Netw.
, vol.18
, pp. 3-23
-
-
Chen, K.-C.1
Lien, S.-Y.2
-
8
-
-
84923122221
-
Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems
-
Apr
-
I. Stojmenovic, "Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems, " IEEE Internet Things J., vol. 1, no. 2, pp. 122-128, Apr. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.2
, pp. 122-128
-
-
Stojmenovic, I.1
-
9
-
-
85014164505
-
-
Waltham, MA, USA: Morgan Kaufmann
-
S. K. Das, K. Kant, N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure. Waltham, MA, USA: Morgan Kaufmann, 2012, pp. 1-817.
-
(2012)
Handbook on Securing Cyber-Physical Critical Infrastructure
, pp. 1-817
-
-
Das, S.K.1
Kant, K.2
Zhang, N.3
-
10
-
-
74949143896
-
Internet of Things-New security and privacy challenges
-
R. H.Weber, "Internet of Things-New security and privacy challenges, " Comput. Law Security Rev., vol. 26, no. 1, pp. 23-30, 2010.
-
(2010)
Comput. Law Security Rev.
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
11
-
-
84864628159
-
Optimal allocation of interconnecting links in cyber-physical systems: Interdependence, cascading failures, and robustness
-
O. Yagan, D. Qian, J. Zhang, and D. Cochran, "Optimal allocation of interconnecting links in cyber-physical systems: Interdependence, cascading failures, and robustness, " IEEE Trans. Parallel Distrib. Syst., vol. 23, pp. 1708-1720, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, pp. 1708-1720
-
-
Yagan, O.1
Qian, D.2
Zhang, J.3
Cochran, D.4
-
12
-
-
84864868854
-
Smart attacks in smart grid communication networks
-
Aug
-
P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Smart attacks in smart grid communication networks, " IEEE Commun. Mag., vol. 50, no. 8, pp. 24-29, Aug. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.8
, pp. 24-29
-
-
Chen, P.-Y.1
Cheng, S.-M.2
Chen, K.-C.3
-
13
-
-
84919978090
-
Securing the internet of things: A standardization perspective
-
S. Keoh, S. Kumar, and H. Tschofenig, "Securing the Internet of Things: A standardization perspective, " IEEE Internet Things J., vol. 1, no. 3, pp. 265-275, 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.3
, pp. 265-275
-
-
Keoh, S.1
Kumar, S.2
Tschofenig, H.3
-
15
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
Jun.
-
D. J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks, " Nature, vol. 393, no. 6684, pp. 440-442, Jun. 1998.
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
16
-
-
0038483826
-
Emergence of scaling in random networks
-
Oct.
-
A.-L. Barabási and R. Albert, "Emergence of scaling in random networks, " Science, vol. 286, no. 5439, pp. 509-512, Oct. 1999.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
17
-
-
0036013593
-
Statistical mechanics of complex networks
-
Jan.
-
R. Albert and A.-L. Barabási, "Statistical mechanics of complex networks, " Rev. Modern Phys., vol. 74, no. 1, pp. 47-97, Jan. 2002.
-
(2002)
Rev. Modern Phys.
, vol.74
, Issue.1
, pp. 47-97
-
-
Albert, R.1
Barabási, A.-L.2
-
18
-
-
0038718854
-
The structure and function of complex networks
-
Mar.
-
M. E. J. Newman, "The structure and function of complex networks, " SIAM Rev., vol. 45, no. 2, pp. 167-256, Mar. 2003.
-
(2003)
SIAM Rev.
, vol.45
, Issue.2
, pp. 167-256
-
-
Newman, M.E.J.1
-
19
-
-
29844458140
-
Understanding Internet topology: Principles, models, and validation
-
Dec.
-
D. Alderson, L. Li, W. Willinger, and J. Doyle, "Understanding Internet topology: Principles, models, and validation, " IEEE/ACM Trans. Netw., vol. 13, no. 6, pp. 1205-1218, Dec. 2005.
-
(2005)
IEEE/ACM Trans. Netw.
, vol.13
, Issue.6
, pp. 1205-1218
-
-
Alderson, D.1
Li, L.2
Willinger, W.3
Doyle, J.4
-
20
-
-
34547816608
-
The architecture of complexity
-
Aug.
-
A.-L. Barabási, "The architecture of complexity, " IEEE Control Syst. Mag., ivol. 27, no. 4, pp. 33-42, Aug. 2007.
-
(2007)
IEEE Control Syst. Mag.
, vol.27
, Issue.4
, pp. 33-42
-
-
Barabási, A.-L.1
-
21
-
-
77956281328
-
Complex networks: An engineering view
-
L. Cui, S. Kumara, and R. Albert, "Complex networks: An engineering view, " IEEE Circuits Syst. Mag., vol. 10, no. 3, pp. 10-25, 2010.
-
(2010)
IEEE Circuits Syst. Mag.
, vol.10
, Issue.3
, pp. 10-25
-
-
Cui, L.1
Kumara, S.2
Albert, R.3
-
22
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Jul.
-
R. Albert, H. Jeong, and A.-L. Barabási, "Error and attack tolerance of complex networks, " Nature, vol. 406, no. 6794, pp. 378-382, Jul. 2000.
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
23
-
-
39449115370
-
Tolerance of intentional attacks in complex communication networks
-
Feb.
-
S. Xiao, G. Xiao, and T. H. Cheng, "Tolerance of intentional attacks in complex communication networks, " IEEE Commun. Mag., vol. 45, no. 1, pp. 146-152, Feb. 2008.
-
(2008)
IEEE Commun. Mag.
, vol.45
, Issue.1
, pp. 146-152
-
-
Xiao, S.1
Xiao, G.2
Cheng, T.H.3
-
24
-
-
84897705146
-
Node removal vulnerability of the largest component of a network
-
P.-Y. Chen and A. Hero, "Node removal vulnerability of the largest component of a network, " in Proc. IEEE GlobalSIP, 2013.
-
(2013)
Proc. IEEE GlobalSIP
-
-
Chen, P.-Y.1
Hero, A.2
-
25
-
-
0034323311
-
Resilience of the Internet to random breakdowns
-
Nov.
-
R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin, "Resilience of the Internet to random breakdowns, " Phys. Rev. Lett., vol. 85, no. 21, pp. 4626-4628, Nov. 2000.
-
(2000)
Phys. Rev. Lett.
, vol.85
, Issue.21
, pp. 4626-4628
-
-
Cohen, R.1
Erez, K.2
Ben-Avraham, D.3
Havlin, S.4
-
26
-
-
66749176965
-
A survey of resilience differentiation frameworks in communication networks
-
P. Cholda, A. Mykkeltveit, B. Helvik, O. Wittner, and A. Jajszczyk, "A survey of resilience differentiation frameworks in communication networks, " IEEE Commun. Surveys Tuts., vol. 9, no. 4, pp. 32-55, 2007.
-
(2007)
IEEE Commun. Surveys Tuts.
, vol.9
, Issue.4
, pp. 32-55
-
-
Cholda, P.1
Mykkeltveit, A.2
Helvik, B.3
Wittner, O.4
Jajszczyk, A.5
-
27
-
-
72449189585
-
Resilience analysis of packet-switched communication networks
-
Dec.
-
M. Menth, M. Duelli, R. Martin, and J. Milbrandt, "Resilience analysis of packet-switched communication networks, " IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1950-1963, Dec. 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.6
, pp. 1950-1963
-
-
Menth, M.1
Duelli, M.2
Martin, R.3
Milbrandt, J.4
-
28
-
-
77953248995
-
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
-
J. P. Sterbenz et al., "Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, " Comput. Netw., vol. 54, no. 8, pp. 1245-1265, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.8
, pp. 1245-1265
-
-
Sterbenz, J.P.1
-
29
-
-
79959999053
-
Network resilience: A systematic approach
-
Jul
-
P. Smith et al., "Network resilience: A systematic approach, " IEEE Commun. Mag., vol. 49, no. 7, pp. 88-97, Jul. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.7
, pp. 88-97
-
-
Smith, P.1
-
30
-
-
4243939794
-
Network robustness and fragility: Percolation on random graphs
-
Dec.
-
D. S. Callaway, M. E. J. Newman, S. H. Strogatz, and D. J. Watts, "Network robustness and fragility: Percolation on random graphs, " Phys. Rev. Lett., vol. 85, no. 25, pp. 5468-5471, Dec. 2000.
-
(2000)
Phys. Rev. Lett.
, vol.85
, Issue.25
, pp. 5468-5471
-
-
Callaway, D.S.1
Newman, M.E.J.2
Strogatz, S.H.3
Watts, D.J.4
-
33
-
-
84863137279
-
Intentional attack and fusion-based defense strategy in complex networks
-
P.-Y. Chen and K.-C. Chen, "Intentional attack and fusion-based defense strategy in complex networks, " in Proc. IEEE Globecom, Dec. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Globecom, Dec.
, pp. 1-5
-
-
Chen, P.-Y.1
Chen, K.-C.2
-
34
-
-
0028430224
-
Network intrusion detection
-
May-Jun.
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection, " IEEE Netw., vol. 8, no. 3, pp. 26-41, May-Jun. 1994.
-
(1994)
IEEE Netw.
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
35
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Apr.
-
T. Bass, "Intrusion detection systems and multisensor data fusion, " Commun. ACM, vol. 43, no. 4, pp. 99-105, Apr. 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
36
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Aug.
-
A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends, " Comput. Netw., vol. 51, no. 12, pp. 3448-3470, Aug. 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
37
-
-
65249118227
-
Network anomaly detection and classification via opportunistic sampling
-
Jan.-Feb.
-
G. Androulidakis, V. Chatzigiannakis, and S. Papavassiliou, "Network anomaly detection and classification via opportunistic sampling, " IEEE Netw., vol. 23, no. 1, pp. 6-12, Jan.-Feb. 2009.
-
(2009)
IEEE Netw.
, vol.23
, Issue.1
, pp. 6-12
-
-
Androulidakis, G.1
Chatzigiannakis, V.2
Papavassiliou, S.3
-
38
-
-
85028098285
-
Parametric methods for anomaly detection in aggregate traffic
-
Apr
-
G. Thatte, U. Mitra, and J. Heidemann, "Parametric methods for anomaly detection in aggregate traffic, " IEEE/ACM Trans. Netw., vol. 19, no. 2, pp. 512-525, Apr. 2011.
-
(2011)
IEEE/ACM Trans. Netw.
, vol.19
, Issue.2
, pp. 512-525
-
-
Thatte, G.1
Mitra, U.2
Heidemann, J.3
-
40
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
Jan
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid, " Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
41
-
-
84876156481
-
Cyberentity security in the Internet of Things
-
H. Ning, H. Liu, and L. T. Yang, "Cyberentity security in the Internet of Things, " IEEE Comput., vol. 46, no. 4, pp. 46-53, 2013.
-
(2013)
IEEE Comput.
, vol.46
, Issue.4
, pp. 46-53
-
-
Ning, H.1
Liu, H.2
Yang, L.T.3
-
42
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
R. Chen, J.-M. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks, " IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.3
-
43
-
-
78651372721
-
Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
-
Feb
-
A. Rawat, P. Anand, H. Chen, and P. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks, " IEEE Trans. Signal Process., vol. 59, no. 2, pp. 774-786, Feb. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.2
, pp. 774-786
-
-
Rawat, A.1
Anand, P.2
Chen, H.3
Varshney, P.4
-
44
-
-
77953686613
-
Sybillimit: A nearoptimal social network defense against sybil attacks
-
Jun
-
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: A nearoptimal social network defense against sybil attacks, " IEEE/ACM Trans. Netw., vol. 18, no. 3, pp. 885-898, Jun. 2010.
-
(2010)
IEEE/ACM Trans. Netw.
, vol.18
, Issue.3
, pp. 885-898
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
45
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Nov.
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM Conf. Comput. Commun. Security, Nov. 2009, pp. 21-32.
-
(2009)
Proc. ACM Conf. Comput. Commun. Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
46
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
47
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
Jun
-
T. T. Kim and H. V. Poor, "Strategic protection against data injection attacks on power grids, " IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
48
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
Quarter
-
K.Pelechrinis, M. Iliofotou, and S. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers, " IEEE Commun. Surveys Tuts., vol. 13, no. 2, pp. 245-257, Quarter 2011.
-
(2011)
IEEE Commun. Surveys Tuts.
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.3
-
49
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
May-Jun.
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: Attack and defense strategies, " IEEE Netw., vol. 20, no. 3, pp. 41-47, May-Jun. 2006.
-
(2006)
IEEE Netw.
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
50
-
-
0035896667
-
Breakdown of the Internet under intentional attack
-
Apr.
-
R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin, "Breakdown of the Internet under intentional attack, " Phys. Rev. Lett., vol. 86, no. 16, pp. 3682-3685, Apr. 2001.
-
(2001)
Phys. Rev. Lett.
, vol.86
, Issue.16
, pp. 3682-3685
-
-
Cohen, R.1
Erez, K.2
Ben-Avraham, D.3
Havlin, S.4
-
51
-
-
38949211589
-
Robustness of the European power grids under intentional attack
-
Feb.
-
R. V. Solé, M. Rosas-Casals, B. Corominas-Murtra, and S. Valverde, "Robustness of the European power grids under intentional attack, " Phys. Rev. E, vol. 77, p. 026102, Feb. 2008.
-
(2008)
Phys. Rev. e
, vol.77
, pp. 026102
-
-
Solé, R.V.1
Rosas-Casals, M.2
Corominas-Murtra, B.3
Valverde, S.4
-
52
-
-
0001216057
-
The Laplacian spectrum of graphs
-
Y. Alavi, G. Chartrand, O. Ollermann, and A. Schwenk, Eds. Hoboken, NJ, USA: Wiley
-
B. Mohar, "The Laplacian spectrum of graphs, " in Graph Theory, Combinatorics, and Applications, Y. Alavi, G. Chartrand, O. Ollermann, and A. Schwenk, Eds. Hoboken, NJ, USA: Wiley, 1991, pp. 871-898.
-
(1991)
Graph Theory, Combinatorics, and Applications
, pp. 871-898
-
-
Mohar, B.1
-
53
-
-
84883245242
-
Percolation theory-based exposure-path prevention for wireless sensor networks coverage in Internet of Things
-
L. Liu, X. Zhang, and H. Ma, "Percolation theory-based exposure-path prevention for wireless sensor networks coverage in Internet of Things, " IEEE Sensors J., vol. 13, no. 10, pp. 3625-3636, 2013.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3625-3636
-
-
Liu, L.1
Zhang, X.2
Ma, H.3
-
54
-
-
84863021024
-
Connectivity of multiple cooperative cognitive radio ad hoc networks
-
W.-C. Ao, S.-M. Cheng, and K.-C. Chen, "Connectivity of multiple cooperative cognitive radio ad hoc networks, " IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 263-270, 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.2
, pp. 263-270
-
-
Ao, W.-C.1
Cheng, S.-M.2
Chen, K.-C.3
-
55
-
-
84990671447
-
A critical point for random graphs with a given degree sequence
-
Mar.
-
M. Molloy and B. Reed, "A critical point for random graphs with a given degree sequence, " Random Struct. Algorithms, vol. 6, pp. 161-179, Mar. 1995.
-
(1995)
Random Struct. Algorithms
, vol.6
, pp. 161-179
-
-
Molloy, M.1
Reed, B.2
-
56
-
-
0035420732
-
Random graphs with arbitrary degree distributions and their applications
-
Jul.
-
M. E. J. Newman, S. H. Strogatz, and D. J. Watts, "Random graphs with arbitrary degree distributions and their applications, " Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat. Interdiscip. Top, vol. 64, p. 026118, Jul. 2001.
-
(2001)
Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat. Interdiscip. Top
, vol.64
, pp. 026118
-
-
Newman, M.E.J.1
Strogatz, S.H.2
Watts, D.J.3
-
57
-
-
0033204106
-
On power-law relationships of the Internet topology
-
Oct.
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the Internet topology, " in ACM SIGCOMM, Oct. 1999, pp. 251-262.
-
(1999)
ACM SIGCOMM
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
58
-
-
0022604939
-
Optimal data fusion in multiple sensor detection systems
-
Jan.
-
Z. Chair and P. K. Varshney, "Optimal data fusion in multiple sensor detection systems, " IEEE Trans. Aerosp. Electron. Syst., vol. AES-22, no. 1, pp. 98-101, Jan. 1986.
-
(1986)
IEEE Trans. Aerosp. Electron. Syst.
, vol.22
, Issue.1
, pp. 98-101
-
-
Chair, Z.1
Varshney, P.K.2
-
59
-
-
0023418467
-
Optimal decision fusion in multiple sensor systems
-
Sep.
-
S. C. A. Thomopoulos, R. Viswanathan, and D. C. Bougoulias, "Optimal decision fusion in multiple sensor systems, " IEEE Trans. Aerosp. Electron. Syst., vol. AES-23, no. 5, pp. 644-653, Sep. 1987.
-
(1987)
IEEE Trans. Aerosp. Electron. Syst.
, vol.23
, Issue.5
, pp. 644-653
-
-
Thomopoulos, S.C.A.1
Viswanathan, R.2
Bougoulias, D.C.3
-
62
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Y. Freund and R. E. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting, " J. Comput. Syst. Sci., vol. 55, no. 1, pp. 119-139, 1997.
-
(1997)
J. Comput. Syst. Sci.
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
63
-
-
84871023469
-
The multiplicative weights update method: A meta-algorithm and applications
-
S. Arora, E. Hazan, and S. Kale, "The multiplicative weights update method: A meta-algorithm and applications, " Theory Comput, vol. 8, no. 6, pp. 121-164, 2012.
-
(2012)
Theory Comput
, vol.8
, Issue.6
, pp. 121-164
-
-
Arora, S.1
Hazan, E.2
Kale, S.3
|