暂无分享,去创建一个
[1] Noga Alon,et al. Algorithmic construction of sets for k-restrictions , 2006, TALG.
[2] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[3] Ion Stoica,et al. Modeling the adoption of new network architectures , 2007, CoNEXT '07.
[4] Roch Guérin,et al. Fostering IPv6 migration through network quality differentials , 2010, CCRV.
[5] Adrian Perrig,et al. Modeling adoptability of secure BGP protocols , 2006, SIGMETRICS '06/Performance '06.
[6] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[7] L. Jean Camp,et al. Diffusion and Adoption of IPv6 in the Arin Region , 2008 .
[8] Zhi-Li Zhang,et al. Dynamics of competition between incumbent and emerging network technologies , 2008, NetEcon '08.
[9] Adrian Perrig,et al. Modeling adoptability of secure BGP protocol , 2006, SIGCOMM 2006.
[10] Sharon Goldberg,et al. Protocols and Lower Bounds for Failure Localization in the Internet , 2008, EUROCRYPT.
[11] Wei Chen,et al. Efficient influence maximization in social networks , 2009, KDD.
[12] David P. Williamson,et al. The Design of Approximation Algorithms , 2011 .
[13] James B. Orlin,et al. A faster algorithm for finding the minimum cut in a graph , 1992, SODA '92.
[14] Matthew Richardson,et al. Mining the network value of customers , 2001, KDD '01.
[15] David D. Clark,et al. Tussle in cyberspace: defining tomorrow's internet , 2005, TNET.
[16] Ning Wang,et al. Provisioning for interdomain quality of service: the MESCAL approach , 2005, IEEE Communications Magazine.
[17] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[18] Stuart E. Schechter,et al. Bootstrapping the Adoption of Internet Security Protocols , 2006, WEIS.
[19] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[20] B. Briscoe,et al. Metcalfe's law is wrong - communications networks increase in value as they add members-but by how much? , 2006, IEEE Spectrum.
[21] Mark S. Granovetter. Threshold Models of Collective Behavior , 1978, American Journal of Sociology.
[22] C. Shapiro,et al. Technology Adoption in the Presence of Network Externalities , 1986, Journal of Political Economy.
[23] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[24] Benjamin Edelman. Running Out of Numbers: Scarcity of IP Addresses and What to Do about It , 2009, AMMA 2009.