暂无分享,去创建一个
Leman Akoglu | Shuchu Han | Hau Chan | L. Akoglu | Hau Chan | Shuchu Han
[1] Fan Chung Graham,et al. The Average Distance in a Random Graph with Given Expected Degrees , 2004, Internet Math..
[2] Ernesto Estrada,et al. Network robustness to targeted attacks. The interplay of expansibility and degree distribution , 2006 .
[3] R. Linsker,et al. Improving network robustness by edge modification , 2005 .
[4] Michalis Faloutsos,et al. Gelling, and melting, large graphs by edge manipulation , 2012, CIKM.
[5] Refael Hassin,et al. Complexity of finding dense subgraphs , 2002, Discret. Appl. Math..
[6] Lars Engebretsen,et al. Clique Is Hard To Approximate Within , 2000 .
[7] Sergiy Butenko,et al. On the maximum quasi-clique problem , 2013, Discret. Appl. Math..
[8] Christos Faloutsos,et al. Fast Robustness Estimation in Large Social Graphs: Communities and Anomaly Detection , 2012, SDM.
[9] J. Håstad. Clique is hard to approximate withinn1−ε , 1999 .
[10] Charalampos E. Tsourakakis. Fast Counting of Triangles in Large Real Networks without Counting: Algorithms and Laws , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[11] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[12] Hisao Tamaki,et al. Greedily Finding a Dense Subgraph , 2000, J. Algorithms.
[13] Robert E. Kooij,et al. Graph measures and network robustness , 2013, ArXiv.
[14] Nam P. Nguyen,et al. On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability , 2013, IEEE/ACM Transactions on Networking.
[15] Charalampos E. Tsourakakis,et al. Denser than the densest subgraph: extracting optimal quasi-cliques with quality guarantees , 2013, KDD.
[16] Hiroyoshi Miwa,et al. Critical Links Detection to Maintain Small Diameter Against Link Failures , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.
[17] Mihalis Yannakakis,et al. How easy is local search? , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[18] Ernesto Estrada,et al. Characterization of the folding degree of proteins , 2002, Bioinform..
[19] Wu Jun,et al. Natural Connectivity of Complex Networks , 2010 .
[20] Hanghang Tong,et al. Make It or Break It: Manipulating Robustness in Large Networks , 2014, SDM.
[21] Caterina M. Scoglio,et al. Optimizing algebraic connectivity by edge rewiring , 2013, Appl. Math. Comput..
[22] Sebastian M. Cioaba,et al. Spectral Densest Subgraph and Independence Number of a Graph , 2007, J. Univers. Comput. Sci..
[23] V. N. Bogaevski,et al. Matrix Perturbation Theory , 1991 .
[24] Moses Charikar,et al. Greedy approximation algorithms for finding dense components in a graph , 2000, APPROX.
[25] Massimo Marchiori,et al. Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[26] Michele Benzi,et al. The Physics of Communicability in Complex Networks , 2011, ArXiv.
[27] D S Callaway,et al. Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.
[28] I. Frisch,et al. Analysis and Design of Survivable Networks , 1970 .
[29] Khaled M. F. Elsayed,et al. Network design methods for mitigation of intentional attacks in scale-free networks , 2012, Telecommun. Syst..
[30] S. Havlin,et al. Optimization of robustness of complex networks , 2004, cond-mat/0404331.
[31] Charu C. Aggarwal,et al. A Survey of Algorithms for Dense Subgraph Discovery , 2010, Managing and Mining Graph Data.
[32] Marco Di Summa,et al. Branch and cut algorithms for detecting critical nodes in undirected graphs , 2012, Computational Optimization and Applications.
[33] Jian Pei,et al. On mining cross-graph quasi-cliques , 2005, KDD '05.
[34] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[35] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[36] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[37] Andrew V. Goldberg,et al. Finding a Maximum Density Subgraph , 1984 .
[38] An Zeng,et al. Enhancing network robustness for malicious attacks , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.
[39] Hiroki Sayama,et al. Optimization of robustness and connectivity in complex networks. , 2003, Physical review letters.
[40] Mauricio G. C. Resende,et al. Greedy Randomized Adaptive Search Procedures , 1995, J. Glob. Optim..
[41] Piet Van Mieghem,et al. Finding critical regions in a network , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[42] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .