A Fast Greedy Algorithm for the Critical Node Detection Problem
暂无分享,去创建一个
[1] Mario Ventresca,et al. A randomized algorithm with local search for containment of pandemic disease spread , 2014, Comput. Oper. Res..
[2] Jure Leskovec,et al. Learning to Discover Social Circles in Ego Networks , 2012, NIPS.
[3] Christos Faloutsos,et al. Graph evolution: Densification and shrinking diameters , 2006, TKDD.
[4] Po-An Chen,et al. Better vaccination strategies for better people , 2010, EC '10.
[5] Marco Di Summa,et al. Branch and cut algorithms for detecting critical nodes in undirected graphs , 2012, Computational Optimization and Applications.
[6] Paul J. Laurienti,et al. A New Measure of Centrality for Brain Networks , 2010, PloS one.
[7] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[8] Mario Ventresca,et al. A derandomized approximation algorithm for the critical node detection problem , 2014, Comput. Oper. Res..
[9] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[10] Panos M. Pardalos,et al. On New Approaches of Assessing Network Vulnerability: Hardness and Approximation , 2012, IEEE/ACM Transactions on Networking.
[11] Eduardo L. Pasiliao,et al. An integer programming framework for critical elements detection in graphs , 2014, J. Comb. Optim..
[12] Tore Opsahl,et al. Clustering in weighted networks , 2009, Soc. Networks.
[13] Jon Kleinberg,et al. Authoritative sources in a hyperlinked environment , 1999, SODA '98.
[14] Eduardo L. Pasiliao,et al. Exact identification of critical nodes in sparse networks via new compact formulations , 2014, Optim. Lett..
[15] Marco Di Summa,et al. Complexity of the critical node problem over trees , 2011, Comput. Oper. Res..
[16] Rajmohan Rajaraman,et al. Existence Theorems and Approximation Algorithms for Generalized Network Security Games , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[17] O. Sporns. Networks of the Brain , 2010 .
[18] My T. Thai,et al. Bound and exact methods for assessing link vulnerability in complex networks , 2014, J. Comb. Optim..
[19] Mario Ventresca,et al. Evaluation of strategies to mitigate contagion spread using social network characteristics , 2013, Soc. Networks.
[20] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[21] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[22] Ehsan Masood,et al. UK seeks physicists for environmental research , 1998, Nature.
[23] Mario Ventresca,et al. Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem , 2012, Comput. Oper. Res..
[24] Marco Di Summa,et al. Identifying critical nodes in undirected graphs: Complexity results and polynomial algorithms for the case of bounded treewidth , 2013, Discret. Appl. Math..
[25] Clayton W. Commander,et al. Identifying Critical Nodes in Protein-Protein Interaction Networks , 2009 .
[26] James Aspnes,et al. Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.
[27] Mario Ventresca,et al. Network robustness versus multi-strategy sequential attack , 2015, J. Complex Networks.
[28] Panos M. Pardalos,et al. Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..
[29] My T. Thai,et al. Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment , 2013, IEEE Transactions on Smart Grid.