-
1
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Albert, R., Jeong, H., and Barabasi, A.-L., 2000, Error and attack tolerance of complex networks. Nature 406:378-382, http://www.nature.com/nature/journal/v406/n6794/full/ 406378a0.html.
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
2
-
-
1842785722
-
Reserving resilient capacity in a network
-
Brightwell, G., Orlodo, G., and Shepherd, F. B., 2001, Reserving resilient capacity in a network, SIAM Journal on Discrete Mathematics 14(4):524-539
-
(2001)
SIAM Journal on Discrete Mathematics
, vol.14
, Issue.4
, pp. 524-539
-
-
Brightwell, G.1
Orlodo, G.2
Shepherd, F.B.3
-
3
-
-
84954512384
-
-
http://citeseer.ist.psu.edu/730763.html.
-
-
-
-
4
-
-
84954490689
-
-
Chekuri, C., Gupta, A., Kumar, A., Naor, J., and Raz, D., 2002, "Building Edge-Failure Resilient Networks," http://citeseer.ist.psu.edu/chekuri02building.html.
-
(2002)
"Building Edge-Failure Resilient Networks,"
-
-
Chekuri, C.1
Gupta, A.2
Kumar, A.3
Naor, J.4
Raz, D.5
-
5
-
-
84880924693
-
-
Choi, H., Subramaniam, S., and Choi, H.-A., 2002, "On Double-Link Failure Recovery in WDM Optical Networks," http://citeseer.ist.psu.edu/choi02doublelink.html.
-
(2002)
"On Double-Link Failure Recovery in WDM Optical Networks,"
-
-
Choi, H.1
Subramaniam, S.2
Choi, H.-A.3
-
6
-
-
80052609191
-
-
Crucitti, P., Latora, V., Marchiori, M., and Rapisarda, A., 2004, "Error and Attack Tolerance of Complex Networks," http://citeseer.ist.psu.edu/724744.html.
-
(2004)
"Error and Attack Tolerance of Complex Networks
-
-
Crucitti, P.1
Latora, V.2
Marchiori, M.3
Rapisarda, A.4
-
7
-
-
84954508005
-
-
Dacomo, A., De Patre, S., Maier, G., Pattavina, A., and Martinelli, M., 2002, "Design of Static Resilient WDM Mesh Networks with Multiple Heuristic Criteria," http://citeseer.ist.psu.edu/508406.html.
-
(2002)
"Design of Static
-
-
Dacomo, A.1
De Patre, S.2
Maier, G.3
Pattavina, A.4
Martinelli, M.5
-
8
-
-
84954505047
-
-
Deccio, C. T., Cox, S., Smith, M., Wan, J., Clement, M., and Snell, Q., 2003, "Survivability of Large Networks in the Presence of Malicious Attacks," http://dna.cs.byu.edu/papers/pdf/ospf.pdf.
-
(2003)
"Survivability of Large Networks in the Presence of Malicious Attacks
-
-
Deccio, C.T.1
Cox, S.2
Smith, M.3
Wan, J.4
Clement, M.5
Snell, Q.6
-
9
-
-
33749616722
-
-
2nd annual meeting of the Asian-Pacific network of centers
-
Duenas-Osorio, L., Craig, J. I., and Goodno, B. J., 2004, "Probabilistic Response of Interdependent Infrastructure Networks," 2nd annual meeting of the Asian-Pacific network of centers. http://mceer.buffalo.edu/research/International_Research/ANCER/Activities/ 2004/osorio_l_maec.pdf.
-
(2004)
"Probabilistic Response of Interdependent Infrastructure Networks
-
-
Duenas-Osorio, L.1
Craig, J.I.2
Goodno, B.J.3
-
10
-
-
33847109724
-
Adversarial deletion in a scale-free random graph process, Combinatorics
-
Flaxman, A. D., Frieze, A. M., and Vera, J., 2007, Adversarial deletion in a scale-free random graph process, Combinatorics, Probability and Computing 16:261-270.
-
(2007)
Probability and Computing
, vol.16
, pp. 261-270
-
-
Flaxman, A.D.1
Frieze, A.M.2
Vera, J.3
-
11
-
-
27144491076
-
Stability and topology of scale-free networks under attack and defense strategies
-
Gallos, L. K., Cohen, R., Argyrakis, P., Bunde, A., and Havlin, S., 2005, Stability and topology of scale-free networks under attack and defense strategies, Physical Review Letters 94(18):188701.
-
(2005)
Physical Review Letters
, vol.94
, Issue.18
, pp. 188701
-
-
Gallos, L.K.1
Cohen, R.2
Argyrakis, P.3
Bunde, A.4
Havlin, S.5
-
12
-
-
41349120887
-
Attack vulnerability of complex networks
-
Holme, P., Kim, B. J., Yoon, C. N., and Han, S. K., 2002, Attack vulnerability of complex networks, Physical Review E 65(5 Pt 2):056109, http://arxiv.org/ftp/cond-mat/papers/0202/0202410.pdf.
-
(2002)
Physical Review E
, vol.65
, Issue.5
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
13
-
-
0027580496
-
Bandwidth packing: A tabu search approach
-
Laguna, M., and Glover, F., 1993, Bandwidth packing: A tabu search approach, Management Science 39:492-500.
-
(1993)
Management Science
, vol.39
, pp. 492-500
-
-
Laguna, M.1
Glover, F.2
-
14
-
-
0036298367
-
Optical network survivability: Protection techniques in the WDM layer
-
Maier, G., Pattavina, A., De Patre, S., and Martinelli, M., 2002, Optical network survivability: protection techniques in the WDM layer, Photonic Network Communications 4(3):251-269, http://citeseer.ist.psu.edu/maier02optical.html.
-
(2002)
Photonic Network Communications
, vol.4
, Issue.3
, pp. 251-269
-
-
Maier, G.1
Pattavina, A.2
De Patre, S.3
Martinelli, M.4
-
15
-
-
0000095026
-
A column generation algorithm for bandwidth packing
-
Parker, M., and Ryan, J., 1994, A column generation algorithm for bandwidth packing, Telecommunications Systems 2:185-196.
-
(1994)
Telecommunications Systems
, vol.2
, pp. 185-196
-
-
Parker, M.1
Ryan, J.2
-
16
-
-
3042611526
-
A directed cycle-based column-and-cut generation method for capacitated survivable network design
-
Rajan, D., and Atamturk, A., 2004, A directed cycle-based column-and-cut generation method for capacitated survivable network design, Networks 43(4):201-211, http://citeseer.ist.psu.edu/760600.html.
-
(2004)
Networks
, vol.43
, Issue.4
, pp. 201-211
-
-
Rajan, D.1
Atamturk, A.2
-
18
-
-
2242427318
-
Design and dimensioning of survivable SDH/SONET networks
-
Sanso, B., and Soriano, P., eds., Kluwer Academic Publishers
-
Soriano, P., Wynants, C., Seguin, R., Labbe, M., Gendreau, M., and Fortz, B., 1998, Design and dimensioning of survivable SDH/SONET networks, in Sanso, B., and Soriano, P., eds., Telecommunications Network Planning, Kluwer Academic Publishers, pp. 147-168.
-
(1998)
Telecommunications Network Planning
, pp. 147-168
-
-
Soriano, P.1
Wynants, C.2
Seguin, R.3
Labbe, M.4
Gendreau, M.5
Fortz, B.6
-
19
-
-
0036346440
-
WDM network optimization by ILP based on source formulation, INFOCOM 2002
-
Tornatore, M., Maier, G., and Pattavina, A., 2002, WDM network optimization by ILP based on source formulation, INFOCOM 2002, Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings, IEEE 3:1813-1821. http://citeseer.ist.psu.edu/tornatore02wdm.html.
-
(2002)
Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings, IEEE
, vol.3
, pp. 1813-1821
-
-
Tornatore, M.1
Maier, G.2
Pattavina, A.3
-
20
-
-
33646388680
-
A column-generation and branch-and-cut approach to the bandwidth-packing problem
-
Villa, C., and Hoffman, K., 2006, A column-generation and branch-and-cut approach to the bandwidth-packing problem, Journal of Research of the National Institute of Standards and Technogy 111:161-185.
-
(2006)
Journal of Research of the National Institute of Standards and Technogy
, vol.111
, pp. 161-185
-
-
Villa, C.1
Hoffman, K.2
-
21
-
-
50249101303
-
Vulnerability of complex networks under intentional attack with incomplete information
-
Wu, J., Deng, H. Z., Tan, Y. J., and Zhu, D. Z., 2007, Vulnerability of complex networks under intentional attack with incomplete information, Journal of Physics A 40:2665-2671.
-
(2007)
Journal of Physics A
, vol.40
, pp. 2665-2671
-
-
Wu, J.1
Deng, H.Z.2
Tan, Y.J.3
Zhu, D.Z.4
-
22
-
-
42749106697
-
Attack vulnerability of scale-free networks due to cascading breakdown
-
Zhao, L., Park, K., and Lai, Y.-C., 2004, Attack vulnerability of scale-free networks due to cascading breakdown, Physical Review E 70:035101.
-
(2004)
Physical Review E
, vol.70
, pp. 035101
-
-
Zhao, L.1
Park, K.2
Lai, Y.-C.3
|