Robustness Analysis of Bipartite Task Assignment Networks: A Case Study in Hospital Logistics System
暂无分享,去创建一个
Qi Xuan | Yewei Yu | Jinyin Chen | Zhongyuan Ruan | Zhong Fu | Zicong Lv | Qi Xuan | Jinyin Chen | Zhongyuan Ruan | Yewei Yu | Z. Fu | Zicong Lv
[1] Zhongyuan Ruan,et al. Kinetics of Social Contagion , 2015, Physical review letters.
[2] Sushil Jajodia,et al. Understanding complex network attack graphs through clustered adjacency matrices , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[3] Hernán A. Makse,et al. Collective Influence Algorithm to find influencers via optimal percolation in massively large social media , 2016, Scientific Reports.
[4] Juhee Hahn,et al. Does pay‐for‐performance enhance perceived distributive justice for collectivistic employees? , 2006 .
[5] Hongzhong Deng,et al. Vulnerability of complex networks under intentional attack with incomplete information , 2007 .
[6] Amir Bashan,et al. Articulation points in complex networks , 2016, Nature Communications.
[7] Fengkuangtian Zhu,et al. Improved collective influence of finding most influential nodes based on disjoint-set reinsertion , 2018, Scientific Reports.
[8] E. Jenelius. Network structure and travel patterns: explaining the geographical disparities of road network vulnerability , 2009 .
[9] Qi Xuan,et al. Fast Gradient Attack on Network Embedding , 2018, ArXiv.
[10] 王建伟,et al. Effect Attack on Scale-Free Networks due to Cascading Failures , 2008 .
[11] Zhongyuan Ruan,et al. Risks of an epidemic in a two-layered railway-local area traveling network , 2013, The European Physical Journal B.
[12] Jiajing Wu,et al. Robustness of Interdependent Power Grids and Communication Networks: A Complex Network Perspective , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[13] Lei Zhang,et al. Node Importance Evaluation Method for Highway Network of Urban Agglomeration , 2011 .
[14] Juan Carlos González-Avella,et al. Fast Fragmentation of Networks Using Module-Based Attacks , 2015, PloS one.
[15] Imtiaz Ahmed,et al. Employee performance evaluation: a fuzzy approach , 2013 .
[16] Qi Xuan,et al. Information filtering by smart nodes in random networks. , 2018, Physical review. E.
[17] Wu Jun,et al. Effect of Eliminating Edges on Robustness of Scale-Free Networks under Intentional Attack , 2010 .
[18] Zhongyuan Ruan,et al. Epidemic spreading between two coupled subpopulations with inner structures. , 2017, Chaos.
[19] Massimiliano Zanin,et al. A comparative analysis of approaches to network-dismantling , 2018, Scientific Reports.
[20] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[21] Hernán A. Makse,et al. Influence maximization in complex networks through optimal percolation , 2015, Nature.
[22] Xiao-Long Ren,et al. Review of ranking nodes in complex networks , 2014 .
[23] Stefano Battiston,et al. The Network of Global Corporate Control , 2011, PloS one.
[24] T. Killingback,et al. Attack Robustness and Centrality of Complex Networks , 2013, PloS one.
[25] Carlo Ricotta,et al. Parametric Scaling from Species Relative Abundances to Absolute Abundances in the Computation of Biological Diversity: A First Proposal Using Shannon's Entropy , 2003, Acta biotheoretica.
[26] Attila Szolnoki,et al. Collective influence in evolutionary social dilemmas , 2016, ArXiv.
[27] Guilhem Semerjian,et al. Network dismantling , 2016, Proceedings of the National Academy of Sciences.
[28] Qi Xuan,et al. Social Synchrony on Complex Networks , 2018, IEEE Transactions on Cybernetics.
[29] Matthieu Latapy,et al. Basic notions for the analysis of large two-mode networks , 2008, Soc. Networks.
[30] Ziyou Gao,et al. Modeling cascading failures in congested complex networks , 2007 .
[31] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[32] Peng Zhang,et al. Cascading failures in interconnected networks with dynamical redistribution of loads , 2015 .
[33] Darren M. Scott,et al. Network Robustness Index : a new method for identifying critical links and evaluating the performance of transportation networks , 2006 .
[34] Qi Xuan,et al. Link Weight Prediction Using Supervised Learning Methods and Its Application to Yelp Layered Network , 2018, IEEE Transactions on Knowledge and Data Engineering.
[35] Qi He,et al. TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.
[36] Qi Xuan,et al. Temporal motifs reveal collaboration patterns in online task-oriented networks. , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.
[37] A. Hamilton,et al. Species diversity or biodiversity? , 2005, Journal of environmental management.
[38] S Arianos,et al. Power grid vulnerability: a complex network approach. , 2008, Chaos.
[39] Petr Pyšek,et al. Impact of invasive plants on the species richness, diversity and composition of invaded communities , 2009 .
[40] Qiang Huang,et al. Inferring domain-domain interactions from protein-protein interactions in the complex network conformation , 2012, BMC Systems Biology.
[41] Zengwang Xu,et al. Exploring the structure of the U.S. intercity passenger air transportation network: a weighted complex network approach , 2008 .
[42] Kelly Blincoe,et al. The Sky Is Not the Limit: Multitasking Across GitHub Projects , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[43] Peteris Daugulis. A note on a generalization of eigenvector centrality for bipartite graphs and applications , 2012, Networks.
[44] Carl T. Bergstrom. Eigenfactor Measuring the value and prestige of scholarly journals , 2007 .
[45] Fei Ma,et al. Robustness analysis of interdependent networks under multiple-attacking strategies , 2017 .
[46] Ke Sun,et al. Complex Networks Theory: A New Method of Research in Power Grid , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.
[47] Vito Latora,et al. Modeling cascading failures in the North American power grid , 2005 .
[48] Mauricio Barahona,et al. Robustness of random graphs based on graph spectra. , 2012, Chaos.
[49] Adem Göleç,et al. A fuzzy model for competency-based employee evaluation and selection , 2007, Comput. Ind. Eng..
[50] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[51] Qi Xuan,et al. Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations , 2018, IEEE Transactions on Knowledge and Data Engineering.
[52] Jian Xu,et al. Cascading failures in coupled map lattices. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[53] Jing Ma,et al. Angle Stability Analysis of Power System With Multiple Operating Conditions Considering Cascading Failure , 2017, IEEE Transactions on Power Systems.
[54] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[55] M. Barthelemy. Betweenness centrality in large complex networks , 2003, cond-mat/0309436.
[56] Paul Erdös,et al. On random graphs, I , 1959 .
[57] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[58] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[59] Qi Xuan,et al. Modern Food Foraging Patterns: Geography and Cuisine Choices of Restaurant Patrons on Yelp , 2018, IEEE Transactions on Computational Social Systems.